Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe
Resource
win10-20231215-en
General
-
Target
4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe
-
Size
4.1MB
-
MD5
5432cd10140f359f17394c8e2340299c
-
SHA1
16ad79a097ff19b5089aff81b6bfa1a664affb18
-
SHA256
4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398
-
SHA512
05925ee28feb718c1d05216be2f4553b0db27f49aab42ae64559daa22c16b24b7c40de4ae83bd38e81f65173bf9584fbcbe3ad481366688a244e2e7774151f96
-
SSDEEP
98304:7ScbaLQaS+m0bcbE+1AZ1bpVDHBz/waoVNVncpH/s6i47:mn50N1AZ1dVLZwaoHxcpfm4
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2832 RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28 PID 2232 wrote to memory of 2832 2232 4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe"C:\Users\Admin\AppData\Local\Temp\4e3934e65b6c2ea6be580d375f4515edf20643d88b5f83db63d2c0ad70ba0398.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5000c1e5f2f5bbf09697f618e7d843652
SHA163d9ce3ab6a738732a46590a4ecfe0e691d71601
SHA256c97291558708c7c898c0384c483e04b0cd17d8acf945d2394751d2473c7a300d
SHA512df7b24ee6e2a5851e4e401e9e1892a5fa7ea0b0b2f09137cbe9feba831623ec1dd5f4585dcccef99e61cfe76f989d6f537a79ca46a90fa619031b84170d7ea82