Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
638957e361adc27c5bdceabf226ed647.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
638957e361adc27c5bdceabf226ed647.exe
Resource
win10v2004-20231215-en
General
-
Target
638957e361adc27c5bdceabf226ed647.exe
-
Size
346KB
-
MD5
638957e361adc27c5bdceabf226ed647
-
SHA1
d055289554f9ef1c06face06155183a1b5aa42cc
-
SHA256
82ba25d1ba7b4159de61d80789de0244241f78e70a8257d6fae20af138bd3925
-
SHA512
e5d718c4bb675d92f47a59d184507cc710d7aa35ce04911601289dafaed2ca6ad7099a573542fff6b7e3053b052fb49120c65d542e93f91253bf30f7209b633c
-
SSDEEP
6144:wM4bfTnPPlznuRO2aGvBA7T9s/+R0/KptnfKCIekxSiecTdh/W:wM4bfDlzntYBoTTztnfKtsDcZ9W
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2456 abc140.exe 1632 abc150.exe 1236 abc160.exe -
Loads dropped DLL 3 IoCs
pid Process 2384 638957e361adc27c5bdceabf226ed647.exe 2384 638957e361adc27c5bdceabf226ed647.exe 2384 638957e361adc27c5bdceabf226ed647.exe -
resource yara_rule behavioral1/memory/2456-12-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/files/0x000e0000000122bb-10.dat upx behavioral1/memory/2456-13-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/memory/2456-14-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/memory/2456-17-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/files/0x0006000000005a5a-21.dat upx behavioral1/memory/1632-25-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/memory/1632-27-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/memory/1632-28-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/memory/1632-29-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/files/0x000a000000013280-33.dat upx behavioral1/memory/1236-37-0x0000000000400000-0x0000000000495000-memory.dmp upx behavioral1/memory/1236-39-0x0000000000400000-0x0000000000495000-memory.dmp upx -
AutoIT Executable 10 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2456-12-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/2456-13-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/2456-14-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/2456-17-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/1632-25-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/1632-27-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/1632-28-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/1632-29-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/1236-37-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe behavioral1/memory/1236-39-0x0000000000400000-0x0000000000495000-memory.dmp autoit_exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\abc160.exe 638957e361adc27c5bdceabf226ed647.exe File created C:\Windows\SysWOW64\abc140.exe 638957e361adc27c5bdceabf226ed647.exe File opened for modification C:\Windows\SysWOW64\abc140.exe 638957e361adc27c5bdceabf226ed647.exe File created C:\Windows\SysWOW64\abc150.exe 638957e361adc27c5bdceabf226ed647.exe File opened for modification C:\Windows\SysWOW64\abc150.exe 638957e361adc27c5bdceabf226ed647.exe File created C:\Windows\SysWOW64\abc160.exe 638957e361adc27c5bdceabf226ed647.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 2256 taskkill.exe 2544 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2256 taskkill.exe Token: SeDebugPrivilege 2544 taskkill.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2424 2384 638957e361adc27c5bdceabf226ed647.exe 18 PID 2384 wrote to memory of 2424 2384 638957e361adc27c5bdceabf226ed647.exe 18 PID 2384 wrote to memory of 2424 2384 638957e361adc27c5bdceabf226ed647.exe 18 PID 2384 wrote to memory of 2424 2384 638957e361adc27c5bdceabf226ed647.exe 18 PID 2384 wrote to memory of 2216 2384 638957e361adc27c5bdceabf226ed647.exe 26 PID 2384 wrote to memory of 2216 2384 638957e361adc27c5bdceabf226ed647.exe 26 PID 2384 wrote to memory of 2216 2384 638957e361adc27c5bdceabf226ed647.exe 26 PID 2384 wrote to memory of 2216 2384 638957e361adc27c5bdceabf226ed647.exe 26 PID 2216 wrote to memory of 2544 2216 cmd.exe 29 PID 2216 wrote to memory of 2544 2216 cmd.exe 29 PID 2216 wrote to memory of 2544 2216 cmd.exe 29 PID 2216 wrote to memory of 2544 2216 cmd.exe 29 PID 2424 wrote to memory of 2256 2424 cmd.exe 28 PID 2424 wrote to memory of 2256 2424 cmd.exe 28 PID 2424 wrote to memory of 2256 2424 cmd.exe 28 PID 2424 wrote to memory of 2256 2424 cmd.exe 28 PID 2384 wrote to memory of 2456 2384 638957e361adc27c5bdceabf226ed647.exe 35 PID 2384 wrote to memory of 2456 2384 638957e361adc27c5bdceabf226ed647.exe 35 PID 2384 wrote to memory of 2456 2384 638957e361adc27c5bdceabf226ed647.exe 35 PID 2384 wrote to memory of 2456 2384 638957e361adc27c5bdceabf226ed647.exe 35 PID 2384 wrote to memory of 1632 2384 638957e361adc27c5bdceabf226ed647.exe 40 PID 2384 wrote to memory of 1632 2384 638957e361adc27c5bdceabf226ed647.exe 40 PID 2384 wrote to memory of 1632 2384 638957e361adc27c5bdceabf226ed647.exe 40 PID 2384 wrote to memory of 1632 2384 638957e361adc27c5bdceabf226ed647.exe 40 PID 2384 wrote to memory of 1236 2384 638957e361adc27c5bdceabf226ed647.exe 42 PID 2384 wrote to memory of 1236 2384 638957e361adc27c5bdceabf226ed647.exe 42 PID 2384 wrote to memory of 1236 2384 638957e361adc27c5bdceabf226ed647.exe 42 PID 2384 wrote to memory of 1236 2384 638957e361adc27c5bdceabf226ed647.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\638957e361adc27c5bdceabf226ed647.exe"C:\Users\Admin\AppData\Local\Temp\638957e361adc27c5bdceabf226ed647.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im 360safe.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 360safe.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im 360tray.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 360tray.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
-
C:\Windows\SysWOW64\abc140.exe"C:\Windows\System32\abc140.exe"2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Windows\SysWOW64\abc150.exe"C:\Windows\System32\abc150.exe"2⤵
- Executes dropped EXE
PID:1632
-
-
C:\Windows\SysWOW64\abc160.exe"C:\Windows\System32\abc160.exe"2⤵
- Executes dropped EXE
PID:1236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
247KB
MD5640fe35061893062ffa6b3e19f39439e
SHA1a58811392b1a4a3d9ce8ddd843ce656fd05e2f43
SHA256e1d477c71df48d2f64124e5fe6f9bc3499f99ed88992156f14f212cc8b3b20cc
SHA5129eb718fcb260ec48ad3e62faa8ace74a7e698d2770430474101c42dffc559fff6ccb99a60768ed85901042d5be3c63fbd46bc2f37563e2e7f54cdf30aaa313f7
-
Filesize
315KB
MD592d896344f35b87c6ba84700345c0bbd
SHA1e0252af51704a5cd21cd89596d1965ee1af6a446
SHA256e77a74e60cd55a4b8d364f423b8700dee403a78aefbd196b59893e07d4c9acc4
SHA512b92db998b23505461724713ac1d8b3acbf22eb8c0588f59e5c37665be0a145e9f5f5a61931ab94a9c5a89548312de96422318ede49746c1ee6b7734b002caa98
-
Filesize
247KB
MD5218d29ae348cca7cff2c383bcff0d889
SHA182a4727425748041864d17962d13b96d47ba8e92
SHA256f62913310f21c8666f0e51371267769bb6906c784db90aac864777c45ccb0877
SHA512af1c8b5f770647210ef6f6de6fc29c27ae42f4cff1220d3f1612eecc337f8c25d03c88803a9ead0c5cf26bdcfbc892d95f8bd41b2bb38f0d6ba9b71916873b24