Analysis
-
max time kernel
1553s -
max time network
1495s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
EtZPtyji.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
EtZPtyji.exe
Resource
win10v2004-20231215-en
General
-
Target
EtZPtyji.exe
-
Size
27.7MB
-
MD5
5a82e1dde9d6d937394d43e7007c4e20
-
SHA1
bd1581112a8b8834dd88a212f7fd33eb08e1fc42
-
SHA256
a13755ee0ec68e6d1dc3af7a4dadf6acf52e8a282c5c873ea491d158488ae7b8
-
SHA512
e984130fa2608797e87601f97de508af227c3bcd08f97312d8d95709c4e1164cadec46f75371a10d8f5d889fc801aca40f792af5d152fc35f8a676eaeb01ee6b
-
SSDEEP
786432:GaLbIdX7mEDaH0bt+tJK/qHeksvgxiBHB:GKIdLjDc0AtNHetvFpB
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\eicar.com EtZPtyji.exe File opened for modification C:\Windows\System32\eicar.com EtZPtyji.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3940 EtZPtyji.exe 3940 EtZPtyji.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3940 EtZPtyji.exe 3940 EtZPtyji.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4512 svchost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4700 3940 EtZPtyji.exe 86 PID 3940 wrote to memory of 4700 3940 EtZPtyji.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\EtZPtyji.exe"C:\Users\Admin\AppData\Local\Temp\EtZPtyji.exe"1⤵
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4700
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4512
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68B
MD544d88612fea8a8f36de82e1278abb02f
SHA13395856ce81f2b7382dee72602f798b642f14140
SHA256275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
SHA512cc805d5fab1fd71a4ab352a9c533e65fb2d5b885518f4e565e68847223b8e6b85cb48f3afad842726d99239c9e36505c64b0dc9a061d9e507d833277ada336ab