Analysis

  • max time kernel
    142s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 19:40

General

  • Target

    5755efd4e347c9c30e898023adcb2ffe.exe

  • Size

    419KB

  • MD5

    5755efd4e347c9c30e898023adcb2ffe

  • SHA1

    bb8792eef67cb4ee9c5d523e1bcaaea8fdbce2c5

  • SHA256

    66349384c0eec6d6522913323e631b734d95f4b1d9a7bf858b40ad7d0a0dd99e

  • SHA512

    4b3bba46b17248a4575e756cd7dadac9f0e6479547572699bfff880b504ca92e16775254073420df7d19c2bbaca657fe408aab61638f74d14559d99c2b310f86

  • SSDEEP

    12288:0Z3/DYraQS9xo+BDL1qy54taMLKYzZx4V:6LYraQS9y+FL1bOtaMLjzZx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5755efd4e347c9c30e898023adcb2ffe.exe
    "C:\Users\Admin\AppData\Local\Temp\5755efd4e347c9c30e898023adcb2ffe.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1992
  • C:\Windows\system.cn
    C:\Windows\system.cn
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2020

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\system.cn

          Filesize

          419KB

          MD5

          5755efd4e347c9c30e898023adcb2ffe

          SHA1

          bb8792eef67cb4ee9c5d523e1bcaaea8fdbce2c5

          SHA256

          66349384c0eec6d6522913323e631b734d95f4b1d9a7bf858b40ad7d0a0dd99e

          SHA512

          4b3bba46b17248a4575e756cd7dadac9f0e6479547572699bfff880b504ca92e16775254073420df7d19c2bbaca657fe408aab61638f74d14559d99c2b310f86

        • memory/1992-0-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/1992-1-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/1992-2-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/1992-9-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/2020-6-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/2020-7-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/2020-10-0x0000000002110000-0x0000000002111000-memory.dmp

          Filesize

          4KB

        • memory/2020-11-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/2020-13-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB

        • memory/2020-19-0x0000000000400000-0x00000000004EC000-memory.dmp

          Filesize

          944KB