Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
72ca2790b547b9320b70a5045a3402f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72ca2790b547b9320b70a5045a3402f3.exe
Resource
win10v2004-20231215-en
General
-
Target
72ca2790b547b9320b70a5045a3402f3.exe
-
Size
582KB
-
MD5
72ca2790b547b9320b70a5045a3402f3
-
SHA1
18fe14b89515870f73809d75a3fd68f892a03799
-
SHA256
8dfa32753eee1068faedf508a48bf664423f8898f9f917937d87b0965438e685
-
SHA512
fe5585cd1a224168a8cf1ebe126eaf7aac2f8a9e918bd0ae5b7963e2d19bb5c5c7d18bf46088cda5ac2cafb1bbe151e0e7433dc3488983c31e95ed1e8cc71768
-
SSDEEP
12288:sgm+Fs4edjCtdK7BFWp1VrfR5J6CytH19mDgQusbIZhY+JWFFHs:sHKsfIqdEbBfR5J6CCOlx0PY+kzH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2660 EntMian.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\EntMian.exe 72ca2790b547b9320b70a5045a3402f3.exe File created C:\Windows\EntMian.exe 72ca2790b547b9320b70a5045a3402f3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1708 72ca2790b547b9320b70a5045a3402f3.exe Token: SeDebugPrivilege 2660 EntMian.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2660 EntMian.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2668 2660 EntMian.exe 29 PID 2660 wrote to memory of 2668 2660 EntMian.exe 29 PID 2660 wrote to memory of 2668 2660 EntMian.exe 29 PID 2660 wrote to memory of 2668 2660 EntMian.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\72ca2790b547b9320b70a5045a3402f3.exe"C:\Users\Admin\AppData\Local\Temp\72ca2790b547b9320b70a5045a3402f3.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
C:\Windows\EntMian.exeC:\Windows\EntMian.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2668
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
582KB
MD572ca2790b547b9320b70a5045a3402f3
SHA118fe14b89515870f73809d75a3fd68f892a03799
SHA2568dfa32753eee1068faedf508a48bf664423f8898f9f917937d87b0965438e685
SHA512fe5585cd1a224168a8cf1ebe126eaf7aac2f8a9e918bd0ae5b7963e2d19bb5c5c7d18bf46088cda5ac2cafb1bbe151e0e7433dc3488983c31e95ed1e8cc71768