Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
7ff8c3459eb228c163b18c6aa8fb633f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ff8c3459eb228c163b18c6aa8fb633f.exe
Resource
win10v2004-20231215-en
General
-
Target
7ff8c3459eb228c163b18c6aa8fb633f.exe
-
Size
699KB
-
MD5
7ff8c3459eb228c163b18c6aa8fb633f
-
SHA1
0b5d63ca6cdd728adf46ab02dcf08b3aa63a641c
-
SHA256
ca246fd47f3db6baa87ff92b716cae1911f48c38abc594ec26f21610d9bff849
-
SHA512
f294d09643238d30116008ab2f52f4616316d7d01496f429ab1018311cb73136f1c365e84abee129d1d602f8dc17082d83dce6a97d445230d7229f2a7f565ffa
-
SSDEEP
12288:bufgk5TDo0ceDZAKD3IqJmiqmr9/qtF3Z4mxxaoJwUp4YAMnf/Ur:Kfg+Dt9AKD3ZJmi/AQmXaouU+3d
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3096 SERVER~1.EXE 4456 Hacker.com.cn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ff8c3459eb228c163b18c6aa8fb633f.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe SERVER~1.EXE File opened for modification C:\Windows\Hacker.com.cn.exe SERVER~1.EXE File created C:\Windows\uninstal.bat SERVER~1.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3096 SERVER~1.EXE Token: SeDebugPrivilege 4456 Hacker.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4456 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3508 wrote to memory of 3096 3508 7ff8c3459eb228c163b18c6aa8fb633f.exe 84 PID 3508 wrote to memory of 3096 3508 7ff8c3459eb228c163b18c6aa8fb633f.exe 84 PID 3508 wrote to memory of 3096 3508 7ff8c3459eb228c163b18c6aa8fb633f.exe 84 PID 4456 wrote to memory of 3616 4456 Hacker.com.cn.exe 86 PID 4456 wrote to memory of 3616 4456 Hacker.com.cn.exe 86 PID 3096 wrote to memory of 2520 3096 SERVER~1.EXE 87 PID 3096 wrote to memory of 2520 3096 SERVER~1.EXE 87 PID 3096 wrote to memory of 2520 3096 SERVER~1.EXE 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ff8c3459eb228c163b18c6aa8fb633f.exe"C:\Users\Admin\AppData\Local\Temp\7ff8c3459eb228c163b18c6aa8fb633f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:2520
-
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
298KB
MD55168b7d1f11f899dbc899237c4ec329b
SHA186f3c2bbe371926c4ccfca68bfa686434b8ae082
SHA2560ead2181026f9347fb67ab7fe569a2f5b5af0f55632a0ee9a0e59dce1501bfa3
SHA512ed0306f862d31885516e8683564befa600641f47190db4a5b0340a19b80164c87899c038c7644827150bf2bf575f98d88f64c7462868f49f6daea1bc2bceeeb2
-
Filesize
164B
MD5924ea7ae6df752587469376459875c51
SHA1ec5fa69c7e5dcaf5b57eefadc4f25a8e4ae073e1
SHA25646c715ac82d5774479b760757498ddb0b9f75cebc116a3da81f9e438bc9bbb09
SHA512ea7b176a411b82faf5fcd785c67180f88f9ff28f7e24c4f4b49f8e7cdc99fb60e38722b61547a4291bdd2c56b3729045c2e8d4afbecfe03612ab0dd8a7b6ae35