Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
7c426569603ae6233a88e1373b32c712.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7c426569603ae6233a88e1373b32c712.exe
Resource
win10v2004-20231215-en
General
-
Target
7c426569603ae6233a88e1373b32c712.exe
-
Size
681KB
-
MD5
7c426569603ae6233a88e1373b32c712
-
SHA1
cdfa64de71be8321d17b9830d32a10fb03303246
-
SHA256
b3ed550c77e934aef0e7c469e6d73b5aff2f5144d619fae0a038833bcb80ba53
-
SHA512
e93eab3c1792ce55272676abaf54adac37b41a637314ce7c24378b5a3b973286331751da39738ddae3c6a8b5e5191a96d0a99d7d5fd82b8cfc8596e807648795
-
SSDEEP
12288:JSpANq/ZANcY5AcB/EN2MG/+vfPmueKD9pHnc5LrS4pzVA5bXzDXUhyslVYgaWaU:JSK4OKY5A08G/+vHmv4884pzIDzU0f5+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4212 update.exe -
Loads dropped DLL 3 IoCs
pid Process 4892 7c426569603ae6233a88e1373b32c712.exe 4212 update.exe 4212 update.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\setupapi.log update.exe File opened for modification \??\c:\windows\KB952287.log update.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 4212 update.exe Token: SeRestorePrivilege 4212 update.exe Token: SeShutdownPrivilege 4212 update.exe Token: SeSecurityPrivilege 4212 update.exe Token: SeTakeOwnershipPrivilege 4212 update.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4212 4892 7c426569603ae6233a88e1373b32c712.exe 89 PID 4892 wrote to memory of 4212 4892 7c426569603ae6233a88e1373b32c712.exe 89 PID 4892 wrote to memory of 4212 4892 7c426569603ae6233a88e1373b32c712.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c426569603ae6233a88e1373b32c712.exe"C:\Users\Admin\AppData\Local\Temp\7c426569603ae6233a88e1373b32c712.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\734b57a4db99c4560c5a6932\update\update.exec:\734b57a4db99c4560c5a6932\update\update.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5ee207e35aea4d5df41d90221e1b66efa
SHA1757469cf9ad2f21f267bbe730560114fdf8a89a5
SHA256cf64c95e9a2d02967efc22b00efb3736156b913a95231eb63c1df45d43475e64
SHA51243e9f75725daa4f3428b2d9cee2c2cc8b2f2e991b8e58d72d2f429fbdfb614c86d172f03d3f9da98756bd4e245643d9a57c6efa422d6c60ad364a2322245542d
-
Filesize
737KB
MD50ff4e4e0dd01e7872d9c2013560fd4a7
SHA1f6a3aa7d551c99c3e9c00c9592c2be1b1cf1a81a
SHA256fadc30d8a636762c424ff4f49d528f22d59c46c20c24c5c4b73badb4deb5e8a1
SHA5128e154e66b6949e93532052a15762db2cbcf9d8dbfce9ef18ae2adcfd126974240716220151d1e59347fb4f094da7ab31701b32d3fdc5726c2da098154319a0b6
-
Filesize
373KB
MD58d13dfd9d7351b2da87ca237277b6cf3
SHA1a9ef7f91183857ae6dba937f9f95282f6c590a9d
SHA256dc2beb43cefa8840d3ac7d622079870f247f97a205a52cb4794b1d688c155463
SHA512d11eee63de309e2b81a92fa9c72a11c1a587e4491214e1d45ad20cba3677ebf99bf98483bbc7f579d5f830e4ca7473d532abc1c6dd7c64ad455e0cd1bcc9a792