Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
8d1f4e1bab18f889afa8eb61eb71033a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d1f4e1bab18f889afa8eb61eb71033a.exe
Resource
win10v2004-20231222-en
General
-
Target
8d1f4e1bab18f889afa8eb61eb71033a.exe
-
Size
57KB
-
MD5
8d1f4e1bab18f889afa8eb61eb71033a
-
SHA1
a0008c2e8220f057de54ec273ef6b491d07b57e2
-
SHA256
12302f4583504a4b8f1b8944911c9aa02ad893ad989d1065b91880b145787f7b
-
SHA512
60361ac6f544e035a4da121c179ac7d7f29f1f3d9d556392f573bf22e38d0894db6d3c2694a1738c63ab952a46699ae3bd399252321360bb87eb739aea5573a9
-
SSDEEP
1536:WqBwbLWJLJFKqAZzrZA4kJJDlAfEXhttgalK:WqBFJLzgOJJpw0/i
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe Token: SeBackupPrivilege 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2240 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 28 PID 1308 wrote to memory of 2240 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 28 PID 1308 wrote to memory of 2240 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 28 PID 1308 wrote to memory of 2240 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 28 PID 1308 wrote to memory of 2240 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 28 PID 1308 wrote to memory of 2240 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 28 PID 1308 wrote to memory of 2240 1308 8d1f4e1bab18f889afa8eb61eb71033a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d1f4e1bab18f889afa8eb61eb71033a.exe"C:\Users\Admin\AppData\Local\Temp\8d1f4e1bab18f889afa8eb61eb71033a.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\ife.txt "C:\PROGRA~1\INTERN~1\ieframe.dll" /a2⤵
- Drops file in Program Files directory
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19.2MB
MD51ceea3fc346fc30864c7bf8899908d27
SHA1e7223750ca3e0e50c10d8a5bdc6bcba39a3b2f15
SHA2568f2364c7d4333ca70d002e5655a9f96fc730862508b3458ad10cd441eb6bb296
SHA51250b8ee3397d0d70dd7f809fd3d598eb31e3fe565a64ab9f2a9a7ddf7a8ce8ad9379e40ec7e5832b44d68ad9d1634ad97ce865174a4f6b46514d624e7ed98fae7
-
Filesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53