Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe
Resource
win10v2004-20231215-en
General
-
Target
13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe
-
Size
700KB
-
MD5
e6df6d2bc6b4d17603362ba6e2e21f72
-
SHA1
96b9a787da00da352755b931a72addae1542ce49
-
SHA256
13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83
-
SHA512
067ffe9403226d15f12ade11c4a96dd6e9ca41636d6ed0fb3dd9a129c7f787ca9196e9f2cbcd55575f0aadd6fc46e2e964aae45376757848a1ba14ecdb958d08
-
SSDEEP
12288:uSEzqHKMbNUxEuOQYdn1xfq35ZQaj2QmeFMcugenvG6Qu8BdFW3twlFPJ0ZlrB6s:u5z87bSe8YdnQZjfm3crene8IM9wHx0s
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2676 2800 WerFault.exe 32 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 2800 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 2972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe Token: SeDebugPrivilege 2972 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2972 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 28 PID 3012 wrote to memory of 2972 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 28 PID 3012 wrote to memory of 2972 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 28 PID 3012 wrote to memory of 2972 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 28 PID 3012 wrote to memory of 2688 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 30 PID 3012 wrote to memory of 2688 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 30 PID 3012 wrote to memory of 2688 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 30 PID 3012 wrote to memory of 2688 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 30 PID 3012 wrote to memory of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 PID 3012 wrote to memory of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 PID 3012 wrote to memory of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 PID 3012 wrote to memory of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 PID 3012 wrote to memory of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 PID 3012 wrote to memory of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 PID 3012 wrote to memory of 2800 3012 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 32 PID 2800 wrote to memory of 2676 2800 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 33 PID 2800 wrote to memory of 2676 2800 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 33 PID 2800 wrote to memory of 2676 2800 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 33 PID 2800 wrote to memory of 2676 2800 13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe"C:\Users\Admin\AppData\Local\Temp\13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jdgdgFNo.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jdgdgFNo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp97CD.tmp"2⤵
- Creates scheduled task(s)
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe"C:\Users\Admin\AppData\Local\Temp\13b35c954c3d9de779bcf72021e30142333bcf7ff7717cde2cce6c189a464b83.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 363⤵
- Program crash
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f51c300e0855155454cb1822ec572713
SHA15ac9b842653b5f408cb5f6501a784523b361ae31
SHA256cc676a85099dd293d99c2a5c602a266070cd5d67b95062cc5866929624b2d7d7
SHA5123e9acadd22e420088174535f70ab6c28e6ac63dfa7ae5aefcf590b1f8dd00344a1c7580e96696e3f98e58a81adbd143f458c3853d090530b185da96af4743d73