Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
867e8691ecd50b6a61c7ec8de1b2de8c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
867e8691ecd50b6a61c7ec8de1b2de8c.exe
Resource
win10v2004-20231222-en
General
-
Target
867e8691ecd50b6a61c7ec8de1b2de8c.exe
-
Size
702KB
-
MD5
867e8691ecd50b6a61c7ec8de1b2de8c
-
SHA1
aa094c32cf46cdb30283e17f8166083c37da8207
-
SHA256
b2f6ff455d8821bd69c16c1aba4931727f5ee558609787675a9b3f057bfe1480
-
SHA512
fa97d3a1e417065472754b2216946630d4f583e16f4bb3a7b95b65968e7697a23e4e597895110bdf5e718ffcfae7fb098912c141df7742422250d74dae4e320b
-
SSDEEP
12288:nRycOktU4g/n/t0EW5A0z/FvJwQ5oalK+Gh39Mva7Ik61QQ52LwRg08y5wj1FP:RxJU4gf2EW5A25Jr1kD39MvmIk6d32
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2788 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 win.com.cn.ini -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 2792 2348 win.com.cn.ini 28 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\win.com.cn.ini 867e8691ecd50b6a61c7ec8de1b2de8c.exe File opened for modification C:\Windows\win.com.cn.ini 867e8691ecd50b6a61c7ec8de1b2de8c.exe File created C:\Windows\UNINSTAL.BAT 867e8691ecd50b6a61c7ec8de1b2de8c.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe Token: SeDebugPrivilege 2348 win.com.cn.ini -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2788 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe 29 PID 1116 wrote to memory of 2788 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe 29 PID 1116 wrote to memory of 2788 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe 29 PID 1116 wrote to memory of 2788 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe 29 PID 1116 wrote to memory of 2788 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe 29 PID 1116 wrote to memory of 2788 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe 29 PID 1116 wrote to memory of 2788 1116 867e8691ecd50b6a61c7ec8de1b2de8c.exe 29 PID 2348 wrote to memory of 2792 2348 win.com.cn.ini 28 PID 2348 wrote to memory of 2792 2348 win.com.cn.ini 28 PID 2348 wrote to memory of 2792 2348 win.com.cn.ini 28 PID 2348 wrote to memory of 2792 2348 win.com.cn.ini 28 PID 2348 wrote to memory of 2792 2348 win.com.cn.ini 28 PID 2348 wrote to memory of 2792 2348 win.com.cn.ini 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\867e8691ecd50b6a61c7ec8de1b2de8c.exe"C:\Users\Admin\AppData\Local\Temp\867e8691ecd50b6a61c7ec8de1b2de8c.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\UNINSTAL.BAT2⤵
- Deletes itself
PID:2788
-
-
C:\Windows\win.com.cn.iniC:\Windows\win.com.cn.ini1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:2792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5db08786dd3528ee23cf3abb136a2cf49
SHA1446c30be6fd8d486e1822566811ff2118e459bdc
SHA2565ea7936d61f24e9b3479ef1bc2b0dff875094eca90e8f6061ad1c7394f0c98f7
SHA512599c32fefa3728a0480c6e24abeb17a3c796fb1507597c26a55b8f36eaeb0df5a8c9603d8fda632b592d020ebe1ff5d19af88a3c5443252e8e499d70ae8a47a7
-
Filesize
702KB
MD5867e8691ecd50b6a61c7ec8de1b2de8c
SHA1aa094c32cf46cdb30283e17f8166083c37da8207
SHA256b2f6ff455d8821bd69c16c1aba4931727f5ee558609787675a9b3f057bfe1480
SHA512fa97d3a1e417065472754b2216946630d4f583e16f4bb3a7b95b65968e7697a23e4e597895110bdf5e718ffcfae7fb098912c141df7742422250d74dae4e320b