Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 23:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8da645d7dc2d8b2ca6ae67140bb3220d.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
8da645d7dc2d8b2ca6ae67140bb3220d.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
8da645d7dc2d8b2ca6ae67140bb3220d.exe
-
Size
157KB
-
MD5
8da645d7dc2d8b2ca6ae67140bb3220d
-
SHA1
009cd1a2b82a64511607fab58e2cc0cd6e2fcf20
-
SHA256
a4d855b4a5a0b6e1e66d451b76411805faf0e368f52c2e49235bd362b20b3320
-
SHA512
d92b43968ff48e215ab12b543eb07fe9d4b3802bdfec6e9b82dbe9ef7a2251b4941a823491c3801472b81f9387e0db902cfb045b074a4b298e2e09ca616d5ddc
-
SSDEEP
3072:MKihb29ToVwwACCEupUq0m8wRpcX48MOnHVetLPEVMu1yMT:MK4bnww6rMMcoQVMW
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\system32\\mpeg4c32.dll" 8da645d7dc2d8b2ca6ae67140bb3220d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mpeg4c32.dll 8da645d7dc2d8b2ca6ae67140bb3220d.exe File opened for modification C:\Windows\SysWOW64\mpeg4c32.dll 8da645d7dc2d8b2ca6ae67140bb3220d.exe -
Kills process with taskkill 1 IoCs
pid Process 448 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4524 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe Token: SeDebugPrivilege 448 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2488 wrote to memory of 448 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe 84 PID 2488 wrote to memory of 448 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe 84 PID 2488 wrote to memory of 448 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe 84 PID 2488 wrote to memory of 2084 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe 88 PID 2488 wrote to memory of 2084 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe 88 PID 2488 wrote to memory of 2084 2488 8da645d7dc2d8b2ca6ae67140bb3220d.exe 88 PID 2084 wrote to memory of 4524 2084 cmd.exe 91 PID 2084 wrote to memory of 4524 2084 cmd.exe 91 PID 2084 wrote to memory of 4524 2084 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\8da645d7dc2d8b2ca6ae67140bb3220d.exe"C:\Users\Admin\AppData\Local\Temp\8da645d7dc2d8b2ca6ae67140bb3220d.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im 360tray.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping localhost -n 1 && del "C:\Users\Admin\AppData\Local\Temp\8da645d7dc2d8b2ca6ae67140bb3220d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 13⤵
- Runs ping.exe
PID:4524
-
-