Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
78c2657e3e0f58ee2f6ab1f7a45a8553.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78c2657e3e0f58ee2f6ab1f7a45a8553.exe
Resource
win10v2004-20231215-en
General
-
Target
78c2657e3e0f58ee2f6ab1f7a45a8553.exe
-
Size
129KB
-
MD5
78c2657e3e0f58ee2f6ab1f7a45a8553
-
SHA1
6d12679ba5575f0a10cac63ebc5b9289ce916f99
-
SHA256
0dab5e3b613c65728affe639a391f43d70a6b6c0478d9ead961b6c0a3d50501d
-
SHA512
0042abd2936e7e383d859cb9801771cce35fe53ea7a1b13d7ea29f2ed133e12ce419f4489cfec0d51a1f767a407d956da3f6a1aed98c2af9a09bb72fb4701d12
-
SSDEEP
3072:RnWLrwWa3FZ/SFqxfWIUojutoI0NnnQgEr9GGXp9:RnqrnoSFqMIButoIgurT
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\help\B41346EFA848.dll 78c2657e3e0f58ee2f6ab1f7a45a8553.exe File opened for modification C:\Windows\help\B41346EFA848.dll 78c2657e3e0f58ee2f6ab1f7a45a8553.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765} 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\ = "SSUUDL" 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ = "C:\\Windows\\help\\B41346EFA848.dll" 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1DBD6574-D6D0-4782-94C3-69619E719765}\InProcServer32\ThreadingModel = "Apartment" 78c2657e3e0f58ee2f6ab1f7a45a8553.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeBackupPrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeBackupPrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe Token: SeRestorePrivilege 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1604 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe 85 PID 1236 wrote to memory of 1604 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe 85 PID 1236 wrote to memory of 1604 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe 85 PID 1236 wrote to memory of 2416 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe 96 PID 1236 wrote to memory of 2416 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe 96 PID 1236 wrote to memory of 2416 1236 78c2657e3e0f58ee2f6ab1f7a45a8553.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\78c2657e3e0f58ee2f6ab1f7a45a8553.exe"C:\Users\Admin\AppData\Local\Temp\78c2657e3e0f58ee2f6ab1f7a45a8553.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2.bat2⤵PID:1604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 2.bat2⤵PID:2416
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64B
MD5d2028dcab709b9af82c969a929bf1209
SHA11bc7989281e563d9403798141971546c9066257c
SHA2567192ef3b746882c4372da7c05a76895e6ea281b35d5d0f3dc72ac12c4a337ae5
SHA5129c99d8bb34e33e39a3c7d01157be6690b08a4ef54c8fa425516d3a28b89b5615e319c3de2f0ddf76be7856c8b94ab6c3a7c4d21389790ff948edf64d822ce130
-
Filesize
63B
MD5a8147d28c0fafa2986fa423f9fc4b7d6
SHA1ec4db2837608111e33f42ecc2b090b0809ce1f9c
SHA256a4b9936adaabec604da99e4beafca2103f8407fdb33bbe1ae8a3dd0c9c641a8f
SHA512d56b8f6cfcc236050ca986c5ac947c0917d2ee25acdd47a7465441c2395ef2a58063ee18a39e4ec609643c19383080886b4e0df480e76f5ec21779aed14deb73
-
Filesize
117KB
MD5af97286fb41adc79e3881b22c4488cd9
SHA17bbd7bbdbd13bf1daab6a67cad47ed4934695bfb
SHA256e3af3f26d4c9580edb0f5acbd4ef4fa8ea9734d24a17ac6b425351dee73a1256
SHA5124c647854f924d59723d6c925f386fd8c2602df230f6b0a944c10427a5b5c7be12f2355ceac47ba17ec670d673ed96b2078a68dbb353ad54bb430f58541685b76