Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 04:10
Static task
static1
Behavioral task
behavioral1
Sample
76592270c1b6c7ff8f5e2ec4954dcfcb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76592270c1b6c7ff8f5e2ec4954dcfcb.exe
Resource
win10v2004-20231215-en
General
-
Target
76592270c1b6c7ff8f5e2ec4954dcfcb.exe
-
Size
384KB
-
MD5
76592270c1b6c7ff8f5e2ec4954dcfcb
-
SHA1
4b40a13dd85429183acc59b9b98888ee1e15c71a
-
SHA256
2f659bfcda501ec9e6fbb89d7143457c5ae64bc6fcc265801aa95b95a9f1bc40
-
SHA512
59e0584e152661755e2c0fd9c422807a9896371e01ccee0a88b4ac69a09b85f94506d408b56fd97a4772c415be82b8040f71c2c6e32aa6375603ab4e6e026ba8
-
SSDEEP
6144:9g0g+ma4UeVyws29usBaUzSE7NF5QkjGhLb2uYGBLQ/X3W0neeMn9n55ZZt:9g1+4FVy529usBvzSERLGFqtyQvDeeMJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2548 cC01804LkFdM01804.exe -
Executes dropped EXE 1 IoCs
pid Process 2548 cC01804LkFdM01804.exe -
Loads dropped DLL 2 IoCs
pid Process 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe -
resource yara_rule behavioral1/memory/3044-3-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/3044-17-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/2548-23-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/2548-27-0x0000000000400000-0x00000000004EE000-memory.dmp upx behavioral1/memory/2548-36-0x0000000000400000-0x00000000004EE000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\cC01804LkFdM01804 = "C:\\ProgramData\\cC01804LkFdM01804\\cC01804LkFdM01804.exe" cC01804LkFdM01804.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main cC01804LkFdM01804.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe Token: SeDebugPrivilege 2548 cC01804LkFdM01804.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2548 cC01804LkFdM01804.exe 2548 cC01804LkFdM01804.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2548 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe 28 PID 3044 wrote to memory of 2548 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe 28 PID 3044 wrote to memory of 2548 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe 28 PID 3044 wrote to memory of 2548 3044 76592270c1b6c7ff8f5e2ec4954dcfcb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\76592270c1b6c7ff8f5e2ec4954dcfcb.exe"C:\Users\Admin\AppData\Local\Temp\76592270c1b6c7ff8f5e2ec4954dcfcb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\ProgramData\cC01804LkFdM01804\cC01804LkFdM01804.exe"C:\ProgramData\cC01804LkFdM01804\cC01804LkFdM01804.exe" "C:\Users\Admin\AppData\Local\Temp\76592270c1b6c7ff8f5e2ec4954dcfcb.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5ab4563a87393458223c2a09403f2167f
SHA13a922b06f7e83acab03015e19fdd4b6e75d56972
SHA2567deca720da2a8cb6463282c5f7c4fba816d24e3ae117b7dfc6d36f6899d9f215
SHA51278220c652e052ce86bcb329cc9240f3187a0260a825a93a8da7dcc6faa1eae5ba6bf2cbcdd7415fcfbe63e0680b159a450e01cb6a4b9c32dc310424f81605bb4
-
Filesize
384KB
MD599143cf9a057e55f859d30c4d4952e0c
SHA1d010be9cfbe5386d7dad0c068ec0f8731d1b9489
SHA256027cf7bba01b11c92f525065fbeb75a525db1d1981a0288a050ae2fe38440913
SHA51286ee093a7f7b724275941efc5780302c964acd56523dce991d5eb742c5aeab2af4de52c3035e746de171d64e576c844e3fc40e1ec9428969b7ebd47f60263d94