Analysis
-
max time kernel
139s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
74e3c1b37cf2d67b06d9f90d5d770d12.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
74e3c1b37cf2d67b06d9f90d5d770d12.exe
Resource
win10v2004-20231215-en
General
-
Target
74e3c1b37cf2d67b06d9f90d5d770d12.exe
-
Size
608KB
-
MD5
74e3c1b37cf2d67b06d9f90d5d770d12
-
SHA1
983285d39901d29f1ee9f51e7048d79b398cc9e0
-
SHA256
ea82f0bb234954cafcf65164abcf2db5031dbfb165c131f24ab780aa751f705d
-
SHA512
58a80af5a9fc6a806ff23c321aadcd53c5e1bfdb19b4cb932cd76a31542eb1a4f4199d1991c6dcd306692a5ee5c2b7e36fe285dca9a81e989778c958c18b9425
-
SSDEEP
12288:IZdPYzwvoVmDas3okKTWlvBPqI6eBb1c2obY7wLN+MyhGKfmt:ItvoVWwTWlv/9ocK+7h7et
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 912 4.exe 4120 cz.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74e3c1b37cf2d67b06d9f90d5d770d12.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\cz.com.cn.exe 4.exe File opened for modification C:\Windows\cz.com.cn.exe 4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 912 4.exe Token: SeDebugPrivilege 4120 cz.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4120 cz.com.cn.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3948 wrote to memory of 912 3948 74e3c1b37cf2d67b06d9f90d5d770d12.exe 89 PID 3948 wrote to memory of 912 3948 74e3c1b37cf2d67b06d9f90d5d770d12.exe 89 PID 3948 wrote to memory of 912 3948 74e3c1b37cf2d67b06d9f90d5d770d12.exe 89 PID 4120 wrote to memory of 2568 4120 cz.com.cn.exe 93 PID 4120 wrote to memory of 2568 4120 cz.com.cn.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\74e3c1b37cf2d67b06d9f90d5d770d12.exe"C:\Users\Admin\AppData\Local\Temp\74e3c1b37cf2d67b06d9f90d5d770d12.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\cz.com.cn.exeC:\Windows\cz.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
745KB
MD5c010f03194d8ade1d88de4d0b402aa54
SHA18b5e06fc269a2407ea11ce5c8c3223467c48b34d
SHA256c7b4340d3a3766caf62fc81a780b8077d2116f36515935bfced7cc60efb517cc
SHA512aba9062329f82d9b62141510fe37af7d46a5af08e0e1903f430c2c993cd623c01ceaed708a16a9584556c46c7e2f88dbb81325dae8c4488a54034f870c0da3b3