Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 03:08
Behavioral task
behavioral1
Sample
714991e30ca905a85311eb53d6c02753.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
714991e30ca905a85311eb53d6c02753.exe
Resource
win10v2004-20231215-en
General
-
Target
714991e30ca905a85311eb53d6c02753.exe
-
Size
78KB
-
MD5
714991e30ca905a85311eb53d6c02753
-
SHA1
94a7b93e9cb051e97392797bad2b4aeaa99f8a51
-
SHA256
6b0ca847febfe93e219418db5cfd90b90c92567a9d8e79047d654a41bc6f2471
-
SHA512
d29c121a8509a6fca1b5c25db5d18009b266962153622a7433a2fae1d715d800a7a4caf2edb34c8f264812f9ae9ba7abeb2cb70f9d05c104356b8f315b5f725b
-
SSDEEP
1536:08tljw/btz4//CrxjhCPSUD4YPpNc5wQa6YnLtbWlNVbg/pJZz3pPRi/:tbehlwNBQa6sZcrAN3B
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2124 714991e30ca905a85311eb53d6c02753.exe -
resource yara_rule behavioral2/memory/2124-0-0x0000000000400000-0x000000000042E000-memory.dmp vmprotect behavioral2/memory/2124-5-0x0000000000400000-0x000000000042E000-memory.dmp vmprotect -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Rhmitpy.dll 714991e30ca905a85311eb53d6c02753.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2124 714991e30ca905a85311eb53d6c02753.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3936 2124 714991e30ca905a85311eb53d6c02753.exe 86 PID 2124 wrote to memory of 3936 2124 714991e30ca905a85311eb53d6c02753.exe 86 PID 2124 wrote to memory of 3936 2124 714991e30ca905a85311eb53d6c02753.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\714991e30ca905a85311eb53d6c02753.exe"C:\Users\Admin\AppData\Local\Temp\714991e30ca905a85311eb53d6c02753.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\714991~1.EXE > nul2⤵PID:3936
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5d9a0915eb425d011338cec421ab3e98e
SHA14c2549650cf9deb0a6c7e448c1ea2a741bf9143a
SHA256341011114164914619cd729ae119a5222c9ad3702852763b0d1eb3f11041eaa2
SHA5128dd2170cad5934a6231f4b0ef5d4a15fd77b7e168b4749a3a41b849d7f070103106c818e6e26d111d7ecc2a4f5eddd2c6f6e6b1e8291d40aa191adcdd2689422