Analysis
-
max time kernel
138s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
723e5b55050f9f403b2dbbd366115a98.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
723e5b55050f9f403b2dbbd366115a98.exe
Resource
win10v2004-20231215-en
General
-
Target
723e5b55050f9f403b2dbbd366115a98.exe
-
Size
769KB
-
MD5
723e5b55050f9f403b2dbbd366115a98
-
SHA1
843cd48bf715a3c26b92f587364df2d5fb6edec0
-
SHA256
6b0cd6f3ca2bb51056e0590bf30bdb4c1af5e54a3a7d86aa165ab31afab11dc2
-
SHA512
2fd33ae9aef6d953382fe9464bdf1d772a0148e64afe4fab858783021f4349c88f4ef0c5c7817fd1640f620f98ccba7419b31402620bb206623acef8a713faec
-
SSDEEP
24576:zISiEKD7cnA7OFdOTEUms2YQmXVVTzobA:zbiEQHSOT5F2FmF2bA
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0003000000022775-80.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 4756 Syslem.exe -
Loads dropped DLL 2 IoCs
pid Process 4756 Syslem.exe 4992 svchost.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Syslem.exe 723e5b55050f9f403b2dbbd366115a98.exe File created C:\Windows\SysWOW64\Syslem.dll 723e5b55050f9f403b2dbbd366115a98.exe File opened for modification C:\Windows\SysWOW64\Syslem.dll 723e5b55050f9f403b2dbbd366115a98.exe File created C:\Windows\SysWOW64\Syslem.dat Syslem.exe File created C:\Windows\SysWOW64\Syslem.exe Syslem.exe File opened for modification C:\Windows\SysWOW64\Syslem.exe Syslem.exe File opened for modification C:\Windows\SysWOW64\Syslem.dll Syslem.exe File created C:\Windows\SysWOW64\Syslem.exe 723e5b55050f9f403b2dbbd366115a98.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2512 4992 WerFault.exe 93 1368 4992 WerFault.exe 93 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 388 723e5b55050f9f403b2dbbd366115a98.exe Token: SeDebugPrivilege 4756 Syslem.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 388 wrote to memory of 2784 388 723e5b55050f9f403b2dbbd366115a98.exe 91 PID 388 wrote to memory of 2784 388 723e5b55050f9f403b2dbbd366115a98.exe 91 PID 388 wrote to memory of 2784 388 723e5b55050f9f403b2dbbd366115a98.exe 91 PID 4756 wrote to memory of 4992 4756 Syslem.exe 93 PID 4756 wrote to memory of 4992 4756 Syslem.exe 93 PID 4756 wrote to memory of 4992 4756 Syslem.exe 93 PID 4756 wrote to memory of 4992 4756 Syslem.exe 93 PID 4756 wrote to memory of 4992 4756 Syslem.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\723e5b55050f9f403b2dbbd366115a98.exe"C:\Users\Admin\AppData\Local\Temp\723e5b55050f9f403b2dbbd366115a98.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\723E5B~1.EXE > nul2⤵PID:2784
-
-
C:\Windows\SysWOW64\Syslem.exeC:\Windows\SysWOW64\Syslem.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Loads dropped DLL
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5043⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 5163⤵
- Program crash
PID:1368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4992 -ip 49921⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4992 -ip 49921⤵PID:3496
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261B
MD5a5debe53f83d97bc3f70e93b3cbef2b1
SHA1ffd0b540e294f0231d69229256ada776590fed18
SHA256e31debd0dcc96bbb510a8e94cf303566c9ff25effde226afeed7a029387d0c2d
SHA51298a8e402205239024027249b7bdfdedf83eaea0f3384f29d685433685c06d7f7b266ff4e79ce1c94dee055c93585dc08c8cea2a13f564987828533a804bd8895
-
Filesize
400KB
MD510ae75dd225b79456424120914ac1cf5
SHA1c97f3220e3481cb0c94f9e553a4a218257cfa928
SHA25651868c85d7234f8f52fc7236927ad2e80c1fe400132eaefb3760ecf5a4825109
SHA5128123bc0f18f3d6e6c2dcfccc652083edf11f506f2eec633ead21abec1f0a58c370e5a10d8a0fec5ce82057761eea1c20ca2097add8d11254cff0811939baa122
-
Filesize
769KB
MD5723e5b55050f9f403b2dbbd366115a98
SHA1843cd48bf715a3c26b92f587364df2d5fb6edec0
SHA2566b0cd6f3ca2bb51056e0590bf30bdb4c1af5e54a3a7d86aa165ab31afab11dc2
SHA5122fd33ae9aef6d953382fe9464bdf1d772a0148e64afe4fab858783021f4349c88f4ef0c5c7817fd1640f620f98ccba7419b31402620bb206623acef8a713faec