Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
59359295a09ac8c914ba04af8b02792f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59359295a09ac8c914ba04af8b02792f.exe
Resource
win10v2004-20231215-en
General
-
Target
59359295a09ac8c914ba04af8b02792f.exe
-
Size
446KB
-
MD5
59359295a09ac8c914ba04af8b02792f
-
SHA1
dadc5949ec139c36e2c78963ebd781b50df48a83
-
SHA256
f72a9581cfb16fef0eebf035f1f7f6850ae37428fbfd03f18dddf856a4cb705a
-
SHA512
fd659a82f6f9dfd68368d6a6b1c6c0e7e35ae63960bb666385457af9510b395dff2422aaff65015721f63fcaaea6ab8448c2b823d8634e30f9762ace6515522b
-
SSDEEP
12288:M/I3XvN06j06W09sPFj/U9MiWUav3j1uLcazMZ:xsPB/U9f4T83
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 696 hI06509LjGdB06509.exe -
Executes dropped EXE 1 IoCs
pid Process 696 hI06509LjGdB06509.exe -
resource yara_rule behavioral2/memory/4108-1-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4108-14-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/696-16-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/696-25-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/696-33-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\hI06509LjGdB06509 = "C:\\ProgramData\\hI06509LjGdB06509\\hI06509LjGdB06509.exe" hI06509LjGdB06509.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 4108 59359295a09ac8c914ba04af8b02792f.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4108 59359295a09ac8c914ba04af8b02792f.exe Token: SeDebugPrivilege 696 hI06509LjGdB06509.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 696 hI06509LjGdB06509.exe 696 hI06509LjGdB06509.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 696 4108 59359295a09ac8c914ba04af8b02792f.exe 92 PID 4108 wrote to memory of 696 4108 59359295a09ac8c914ba04af8b02792f.exe 92 PID 4108 wrote to memory of 696 4108 59359295a09ac8c914ba04af8b02792f.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\59359295a09ac8c914ba04af8b02792f.exe"C:\Users\Admin\AppData\Local\Temp\59359295a09ac8c914ba04af8b02792f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\ProgramData\hI06509LjGdB06509\hI06509LjGdB06509.exe"C:\ProgramData\hI06509LjGdB06509\hI06509LjGdB06509.exe" "C:\Users\Admin\AppData\Local\Temp\59359295a09ac8c914ba04af8b02792f.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
446KB
MD51f39503e68d43ec3e38c030f1cbfa33b
SHA17ba72c1bb47bf572f370c2f8253c47ddeaa3e8ca
SHA256dae116d3f59f6bb6210c6c6a35ae13e6cf773681a6172db5ddd27ede0ae235bd
SHA512fcf1293d9ddf3eddab6f4ce7431f3491223d9699e5bd5b375b1d5ea93037f04604d001355516edb4f404b8e30a98ccd81cfee4e4d7363cbff4c4456dfc8c4853