Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 04:12
Static task
static1
Behavioral task
behavioral1
Sample
8b5d20154aaa10b6dce417768c3a4eda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b5d20154aaa10b6dce417768c3a4eda.exe
Resource
win10v2004-20231222-en
General
-
Target
8b5d20154aaa10b6dce417768c3a4eda.exe
-
Size
78KB
-
MD5
8b5d20154aaa10b6dce417768c3a4eda
-
SHA1
469ddcde32324ce5257374dd29d8618e05d47da6
-
SHA256
569584c726592c022fabb1ddeab4bf5549a8d6e324e202b5b051516bc13ad524
-
SHA512
8fd46451f2527ab651f0c563e470ebc6125a2eab067dabac07a34347f4d9acbc4afabdf6666c34ef2c002863aae4b75c5fc78cee939d6ec1e3aef26856d53765
-
SSDEEP
1536:izj4loW/INYCgJc0JJW1nJ6JaN9DhglN4ID9QfQs:izjQFJbJJWtUJmDhwzD2fQs
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 2512 8b5d20154aaa10b6dce417768c3a4eda.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2512 8b5d20154aaa10b6dce417768c3a4eda.exe Token: SeBackupPrivilege 2512 8b5d20154aaa10b6dce417768c3a4eda.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2144 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 28 PID 2512 wrote to memory of 2144 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 28 PID 2512 wrote to memory of 2144 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 28 PID 2512 wrote to memory of 2144 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 28 PID 2512 wrote to memory of 2144 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 28 PID 2512 wrote to memory of 2144 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 28 PID 2512 wrote to memory of 2144 2512 8b5d20154aaa10b6dce417768c3a4eda.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b5d20154aaa10b6dce417768c3a4eda.exe"C:\Users\Admin\AppData\Local\Temp\8b5d20154aaa10b6dce417768c3a4eda.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\ife.txt "C:\PROGRA~1\INTERN~1\ieframe.dll" /a2⤵
- Drops file in Program Files directory
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5d465674fd88a48f1a43dd3dfe30971ae
SHA139bcee9026ea9fc251c164b283894bb72021fa41
SHA256627f1639231409c5f89fafe88ddfe1a58dd3bdc3e842a815986c7102f856690e
SHA512b3bbcc728259c6dd6270a8435be710d287ee8cf63c00b0843e066177e02078a2c63bf872d10ddf858dbc461ae3b8a2ad519cc4d45a9641f91e36e36e83a4c7f5
-
Filesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53