Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
994a36321a63f1e49b3a79afa332fa07.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
994a36321a63f1e49b3a79afa332fa07.exe
Resource
win10v2004-20231215-en
General
-
Target
994a36321a63f1e49b3a79afa332fa07.exe
-
Size
10KB
-
MD5
994a36321a63f1e49b3a79afa332fa07
-
SHA1
c45250cb0fef51942c981950928d518f88b09421
-
SHA256
d133dc4fce7e41aadcb99764b6a212aff2d50d1b8c447289582232885a13b97d
-
SHA512
86a256ea0d9efd9e9acfa6e37f680eb477e2622c2e7e0a7ea4646b4b9b4fe40cb09f731fba5cbbeddd01a9dd838ed7aa119ecf895e4ef94585b7e4c80d8d3c43
-
SSDEEP
192:Nekfn2UklmxRdn/YL6dqkYTLZk/JDHWYOG372+NGMXkpKQVc5ndzP8D6vmj5:Nrv2Hmx3yoq9mhf17h4MXkXc5ndzPut
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3020 fxmngr.exe -
Loads dropped DLL 2 IoCs
pid Process 2316 994a36321a63f1e49b3a79afa332fa07.exe 2316 994a36321a63f1e49b3a79afa332fa07.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ts.ico 994a36321a63f1e49b3a79afa332fa07.exe File created C:\Windows\SysWOW64\ot.ico 994a36321a63f1e49b3a79afa332fa07.exe File created C:\Windows\SysWOW64\fxmngr.exe 994a36321a63f1e49b3a79afa332fa07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3020 fxmngr.exe Token: SeIncBasePriorityPrivilege 2316 994a36321a63f1e49b3a79afa332fa07.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3020 2316 994a36321a63f1e49b3a79afa332fa07.exe 28 PID 2316 wrote to memory of 3020 2316 994a36321a63f1e49b3a79afa332fa07.exe 28 PID 2316 wrote to memory of 3020 2316 994a36321a63f1e49b3a79afa332fa07.exe 28 PID 2316 wrote to memory of 3020 2316 994a36321a63f1e49b3a79afa332fa07.exe 28 PID 2316 wrote to memory of 2824 2316 994a36321a63f1e49b3a79afa332fa07.exe 30 PID 2316 wrote to memory of 2824 2316 994a36321a63f1e49b3a79afa332fa07.exe 30 PID 2316 wrote to memory of 2824 2316 994a36321a63f1e49b3a79afa332fa07.exe 30 PID 2316 wrote to memory of 2824 2316 994a36321a63f1e49b3a79afa332fa07.exe 30 PID 3020 wrote to memory of 2948 3020 fxmngr.exe 29 PID 3020 wrote to memory of 2948 3020 fxmngr.exe 29 PID 3020 wrote to memory of 2948 3020 fxmngr.exe 29 PID 3020 wrote to memory of 2948 3020 fxmngr.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\994a36321a63f1e49b3a79afa332fa07.exe"C:\Users\Admin\AppData\Local\Temp\994a36321a63f1e49b3a79afa332fa07.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\fxmngr.exeC:\Windows\system32\fxmngr.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\fxmngr.exe > nul3⤵PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\994A36~1.EXE > nul2⤵
- Deletes itself
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109B
MD5c4580e9be3994b1fc0ce3514361e0904
SHA15f40833c03c06a07b783a0a321cc3bae3273e0bd
SHA256a8cf4beb7281287cf1eab1eaf5f06fb1cbe19b0d053c3eaef08be03f05ddff80
SHA51270b1e6431cb71865d6bb5d6f0cb403d5334ffd7f5393340120cb4939318143a80b61c98ca76c646ae4c5503ce8c400f0c674244bbbde95685a6720ba5271cf73
-
Filesize
109B
MD582c6041e6f1e8edaef89150ce7c09e3d
SHA1b1914bb4491357de109f639d031d375f1c3ee3f1
SHA2560f26bd5671f3cbfd0056cc3e44dc3ede7c8d5b0700071f546faf7908a7f0ee64
SHA51267b69b25b6d0fd6c2002f183d0f2d24f8b56464a72356c37a1ce48653dc4d05893332b0054b6a21b2667ecf0d961be0b53bea587013a1e54a01b6799e5a36a76
-
Filesize
2KB
MD5af1444409e57da51b24ddcc141ba86d9
SHA1a43c07c82cc766e418cf8b3bfe1f3a158d3c4977
SHA256f7b7738a55c2c092dd6f6089f82bcb10adf9bfcb36169bad111580b8b48d6bee
SHA512c3ffd1a935ae99185a2929d4021e855094e300f7262ceac7d02dfd805545c4201b266847b9eba6ec519a9d62d66b213e4bec7a3f500b25662dcf092b25c00d58