Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
98eb8f406496988aa8ab1aec8523fef5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98eb8f406496988aa8ab1aec8523fef5.exe
Resource
win10v2004-20231215-en
General
-
Target
98eb8f406496988aa8ab1aec8523fef5.exe
-
Size
484KB
-
MD5
98eb8f406496988aa8ab1aec8523fef5
-
SHA1
829045033566491c1b529182904b4ec80590dc43
-
SHA256
481350cbfc53ab6da8003e78af04c1c7a28f1640bcf5e09e3e9b4991e6bf9afe
-
SHA512
dc2764b3be7faa6badb1fcc51bc798308a1c15d5693d73a21167ff089ae088dac8ba6d060930691cca09318c8851875ab78292826cdcd04cf9ca9b68e48ef170
-
SSDEEP
12288:BLPkCDt1EG2XVekhdeTNpRx+gyq3Zg3gaAllkCi2Nnofi:BLPkQ1bqAlpmgyEKBMlkr2Nn
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1832 ddodHost.exe 3876 AtBrcurl.exe 3640 ~83A7.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RdpSeown = "C:\\Users\\Admin\\AppData\\Roaming\\appist3g\\ddodHost.exe" 98eb8f406496988aa8ab1aec8523fef5.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\AtBrcurl.exe 98eb8f406496988aa8ab1aec8523fef5.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4964 2124 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1832 ddodHost.exe 1832 ddodHost.exe 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe 3520 Explorer.EXE 3520 Explorer.EXE 3876 AtBrcurl.exe 3876 AtBrcurl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1832 ddodHost.exe Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3520 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1832 2124 98eb8f406496988aa8ab1aec8523fef5.exe 84 PID 2124 wrote to memory of 1832 2124 98eb8f406496988aa8ab1aec8523fef5.exe 84 PID 2124 wrote to memory of 1832 2124 98eb8f406496988aa8ab1aec8523fef5.exe 84 PID 1832 wrote to memory of 3640 1832 ddodHost.exe 87 PID 1832 wrote to memory of 3640 1832 ddodHost.exe 87 PID 3640 wrote to memory of 3520 3640 ~83A7.tmp 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\98eb8f406496988aa8ab1aec8523fef5.exe"C:\Users\Admin\AppData\Local\Temp\98eb8f406496988aa8ab1aec8523fef5.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\appist3g\ddodHost.exe"C:\Users\Admin\AppData\Roaming\appist3g"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\~83A7.tmp3520 495624 1832 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 6363⤵
- Program crash
PID:4964
-
-
-
C:\Windows\SysWOW64\AtBrcurl.exeC:\Windows\SysWOW64\AtBrcurl.exe -s1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2124 -ip 21241⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5aac3165ece2959f39ff98334618d10d9
SHA1020a191bfdc70c1fbd3bf74cd7479258bd197f51
SHA25696fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974
SHA5129eb876812a6a13dd4b090788c2b1d9e9a2e25370598ed5c040f82e6f378edc4b78d58bc8f60d5a559ea57b1edcf3a144bfe09454a9928997173db8279d5b40cf
-
Filesize
484KB
MD58283b0aa9acb196e16cc94fdbb6ecae8
SHA16ed876a97711b76c795b370a47c9d19ea69fa957
SHA2565bd46c7ad6ea20a670167334e730b2f80ff51c150533fae3730c976283cb5d87
SHA512cd94cade8c22b5d4cdacf71e6c060e62070dccc3ebeaf26c04319eb7b33c457d6a5e217904897a2a6078cecf681f024eaace4e035dac7b90ba5f9b24d8826578