Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
9a923327f80594e1cf4764789c411f19.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a923327f80594e1cf4764789c411f19.exe
Resource
win10v2004-20231222-en
General
-
Target
9a923327f80594e1cf4764789c411f19.exe
-
Size
333KB
-
MD5
9a923327f80594e1cf4764789c411f19
-
SHA1
47305d481a66c767151c5badeb5534bf67bc1057
-
SHA256
c3d1440e90da51a9101c6106b7f3c932c85380fac8685b17f45bc8fa7247d6e9
-
SHA512
b7dce764fdc6482f94b11954429a132a69dd11781b827f82655b5267f32e1443fdd5a58c1021c400ddb2b47aca7deb5d422d2564be3466d90c9911c8dfdee1ce
-
SSDEEP
6144:mdIUF2idZecnl20lHRxp3gqu8C0iybuwCamPd2ZcgGtPugdffuK2FGc8d3q:N0F3Z4mxxe8C0iybuZau2NGFfd3uK2UQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5016 9a923327f80594e1cf4764789c411f19.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\9a923327f80594e1cf4764789c411f19.exe 9a923327f80594e1cf4764789c411f19.exe File created C:\Windows\9a923327f80594e1cf4764789c411f19.exe 9a923327f80594e1cf4764789c411f19.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4872 9a923327f80594e1cf4764789c411f19.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4872 wrote to memory of 2428 4872 9a923327f80594e1cf4764789c411f19.exe 86 PID 4872 wrote to memory of 2428 4872 9a923327f80594e1cf4764789c411f19.exe 86 PID 4872 wrote to memory of 2428 4872 9a923327f80594e1cf4764789c411f19.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a923327f80594e1cf4764789c411f19.exe"C:\Users\Admin\AppData\Local\Temp\9a923327f80594e1cf4764789c411f19.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\9A9233~1.EXE > nul2⤵PID:2428
-
-
C:\Windows\9a923327f80594e1cf4764789c411f19.exeC:\Windows\9a923327f80594e1cf4764789c411f19.exe1⤵
- Executes dropped EXE
PID:5016
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
333KB
MD59a923327f80594e1cf4764789c411f19
SHA147305d481a66c767151c5badeb5534bf67bc1057
SHA256c3d1440e90da51a9101c6106b7f3c932c85380fac8685b17f45bc8fa7247d6e9
SHA512b7dce764fdc6482f94b11954429a132a69dd11781b827f82655b5267f32e1443fdd5a58c1021c400ddb2b47aca7deb5d422d2564be3466d90c9911c8dfdee1ce