Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
8b21749fac5a8598eb4bfae6d0d31cb2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b21749fac5a8598eb4bfae6d0d31cb2.exe
Resource
win10v2004-20231222-en
General
-
Target
8b21749fac5a8598eb4bfae6d0d31cb2.exe
-
Size
8KB
-
MD5
8b21749fac5a8598eb4bfae6d0d31cb2
-
SHA1
7a94a2e1f19e9b852fabb0a003b0fba3752a4479
-
SHA256
a732615312a051981641177f657e67bc4ba9c6f42a02cd850a47704b27d6ffcc
-
SHA512
e051b39d73bbe6b0feac77a29b8baeffdc0472fae822afddd243ca712b65655ebbbf2a510a9a5f3341c7ec215fb3b64153dfa092debdb2c63f304556dc4368e0
-
SSDEEP
192:ULuY6YpjLGH4MTgcJjmhyVt2KKBWDi+SHB:GuYXjLGHjzqYt2VQ9S
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2336 8b21749fac5a8598eb4bfae6d0d31cb2.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\8b21749fac5a8598eb4bfae6d0d31cb2.exe 8b21749fac5a8598eb4bfae6d0d31cb2.exe File created C:\Windows\SysWOW64\8b21749fac5a8598eb4bfae6d0d31cb2.exe 8b21749fac5a8598eb4bfae6d0d31cb2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2428 8b21749fac5a8598eb4bfae6d0d31cb2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2352 2428 8b21749fac5a8598eb4bfae6d0d31cb2.exe 29 PID 2428 wrote to memory of 2352 2428 8b21749fac5a8598eb4bfae6d0d31cb2.exe 29 PID 2428 wrote to memory of 2352 2428 8b21749fac5a8598eb4bfae6d0d31cb2.exe 29 PID 2428 wrote to memory of 2352 2428 8b21749fac5a8598eb4bfae6d0d31cb2.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b21749fac5a8598eb4bfae6d0d31cb2.exe"C:\Users\Admin\AppData\Local\Temp\8b21749fac5a8598eb4bfae6d0d31cb2.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\8B2174~1.EXE > nul2⤵
- Deletes itself
PID:2352
-
-
C:\Windows\SysWOW64\8b21749fac5a8598eb4bfae6d0d31cb2.exeC:\Windows\SysWOW64\8b21749fac5a8598eb4bfae6d0d31cb2.exe1⤵
- Executes dropped EXE
PID:2336
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD58b21749fac5a8598eb4bfae6d0d31cb2
SHA17a94a2e1f19e9b852fabb0a003b0fba3752a4479
SHA256a732615312a051981641177f657e67bc4ba9c6f42a02cd850a47704b27d6ffcc
SHA512e051b39d73bbe6b0feac77a29b8baeffdc0472fae822afddd243ca712b65655ebbbf2a510a9a5f3341c7ec215fb3b64153dfa092debdb2c63f304556dc4368e0