Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 03:26
Static task
static1
Behavioral task
behavioral1
Sample
85cc500e9d627adf6c993b35c10e32de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85cc500e9d627adf6c993b35c10e32de.exe
Resource
win10v2004-20231215-en
General
-
Target
85cc500e9d627adf6c993b35c10e32de.exe
-
Size
414KB
-
MD5
85cc500e9d627adf6c993b35c10e32de
-
SHA1
9f22a7e0577d657e418d93e9c2f501ffd94a50e6
-
SHA256
d6be4a9ced2bb27e8d077642c3ca0473d1d63123935719e293a226bffec8fcd4
-
SHA512
ecda6ab10dfcc208030b01078768a6282e1df6b14963b86ffec824b81a16eccc2a1144353c21ba60436ac4967776b1418be51314908b514f8efd36b2ac8b0624
-
SSDEEP
12288:xEU3npqLuOCtLpq7vnGjp2Vofyr3t/Fwh0uZatfGRxSI:xEU3pqLXEUQ2VofyxFwh0N
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\ProgramData\\dH07501DcJiA07501\\dH07501DcJiA07501.exe" 85cc500e9d627adf6c993b35c10e32de.exe -
Deletes itself 1 IoCs
pid Process 2272 dH07501DcJiA07501.exe -
Executes dropped EXE 1 IoCs
pid Process 2272 dH07501DcJiA07501.exe -
Loads dropped DLL 2 IoCs
pid Process 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe -
resource yara_rule behavioral1/memory/2460-1-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/2460-10-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/2460-30-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/2272-31-0x0000000000400000-0x00000000004D2000-memory.dmp upx behavioral1/memory/2272-38-0x0000000000400000-0x00000000004D2000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\dH07501DcJiA07501 = "C:\\ProgramData\\dH07501DcJiA07501\\dH07501DcJiA07501.exe" dH07501DcJiA07501.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe 2460 85cc500e9d627adf6c993b35c10e32de.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2460 85cc500e9d627adf6c993b35c10e32de.exe Token: SeDebugPrivilege 2272 dH07501DcJiA07501.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2272 2460 85cc500e9d627adf6c993b35c10e32de.exe 32 PID 2460 wrote to memory of 2272 2460 85cc500e9d627adf6c993b35c10e32de.exe 32 PID 2460 wrote to memory of 2272 2460 85cc500e9d627adf6c993b35c10e32de.exe 32 PID 2460 wrote to memory of 2272 2460 85cc500e9d627adf6c993b35c10e32de.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\85cc500e9d627adf6c993b35c10e32de.exe"C:\Users\Admin\AppData\Local\Temp\85cc500e9d627adf6c993b35c10e32de.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\ProgramData\dH07501DcJiA07501\dH07501DcJiA07501.exe"C:\ProgramData\dH07501DcJiA07501\dH07501DcJiA07501.exe" "C:\Users\Admin\AppData\Local\Temp\85cc500e9d627adf6c993b35c10e32de.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD56a7a7c228024185c43f513dd4870313f
SHA1a8ade6f526c9aa75aa355260a182f85cbafd9eee
SHA25616340e8cf4d466d378192d689168b525d43bbd36409ed8297cab386fb6b74926
SHA512a9929b0aed8843090da47f6a086ef351dc10f0664d639c7fd530966a00a83be9ae88de4072a12e73af2a1a2c6d9389462bcb05224ac5a179af03b5b23a00fdcb
-
Filesize
414KB
MD5d8300fa2cd316081f70df2b9fd1b647e
SHA1346ff656e0e3b6cce5f0295e39950ace7e09ea80
SHA256db4f714b77fdfedf3e985d5495f4122dd289496cf39f82b87237f3e47bc7f81c
SHA512d72481d85d44e3b58c73dc7abc4753d28d3d87109cfaa65c5420f610a0fe7ac3942eb4dabe4bf14632d18c30fd8df5112b330046347759ba28d77741f9d83fd1