Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 04:04
Static task
static1
Behavioral task
behavioral1
Sample
66a6bf14e235d55ee2cf521eacfa2ff0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
66a6bf14e235d55ee2cf521eacfa2ff0.exe
Resource
win10v2004-20231215-en
General
-
Target
66a6bf14e235d55ee2cf521eacfa2ff0.exe
-
Size
57KB
-
MD5
66a6bf14e235d55ee2cf521eacfa2ff0
-
SHA1
5484199fd6a042fb097f038538cdb0b5f372e32f
-
SHA256
6f45377781c6e3d48128293e2964e9f5270386e17823795cd81c82fcdf431147
-
SHA512
40f3482cbe5f6a19388ca9f156a887be9c27fb6d804021fd94c3190ce69b2f36e8dbb7f0232174b8e8e9fa465de7382089dcff1a084d99ffc6ff694650cb5c31
-
SSDEEP
1536:WqBwbLWJLJFKqAZzrZA4kJJeVlAfEXhYj9e++W7BVXfA:WqBFJLzgOJJyw029e+HdV4
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe Token: SeBackupPrivilege 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2764 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 28 PID 2324 wrote to memory of 2764 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 28 PID 2324 wrote to memory of 2764 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 28 PID 2324 wrote to memory of 2764 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 28 PID 2324 wrote to memory of 2764 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 28 PID 2324 wrote to memory of 2764 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 28 PID 2324 wrote to memory of 2764 2324 66a6bf14e235d55ee2cf521eacfa2ff0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a6bf14e235d55ee2cf521eacfa2ff0.exe"C:\Users\Admin\AppData\Local\Temp\66a6bf14e235d55ee2cf521eacfa2ff0.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\ife.txt "C:\PROGRA~1\INTERN~1\ieframe.dll" /a2⤵
- Drops file in Program Files directory
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5458ece8db0bc921c666f539d7b192ec8
SHA1a82571072adb61c254793e206ce94cf84769e946
SHA256cef2217867eb6ac14097f438486e384bbde9cdfa79c0a3cd10ce3563b23574c1
SHA5125533ba5fee9a608fb79393e6710c6e94f29c9711ea3d17f2ef699d71d4d73add5467f736e7e13393d7aec40dd996238f4cdd8cfd58a6a29d049bee6858288445
-
Filesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53