Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
a25d5af9c92132698e2550c7e7a9bcfc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a25d5af9c92132698e2550c7e7a9bcfc.exe
Resource
win10v2004-20240221-en
General
-
Target
a25d5af9c92132698e2550c7e7a9bcfc.exe
-
Size
77KB
-
MD5
a25d5af9c92132698e2550c7e7a9bcfc
-
SHA1
b1d27b73739e688fd73a0c44bb3a4b58cb497e2e
-
SHA256
3d851a577308810be2e37a3be7812430055c2e72a4bacbc412295567d52b30b7
-
SHA512
a2c168224bc7bda7d6fe0f3ce946d00391fa9d09fa4f17bda8dc5869fdac0e83c885d6b37112947b41e044adea01ae54e5e7a8d9ec7a97b96478f5a6f79b8c9b
-
SSDEEP
1536:xf4exGDkeZ4mOoSgJEAJJ+mqoQP+lpws/X9AJeOs:p4eYZ4+1JXJJ+JUp5X9OeH
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe Token: SeBackupPrivilege 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2344 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 28 PID 1976 wrote to memory of 2344 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 28 PID 1976 wrote to memory of 2344 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 28 PID 1976 wrote to memory of 2344 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 28 PID 1976 wrote to memory of 2344 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 28 PID 1976 wrote to memory of 2344 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 28 PID 1976 wrote to memory of 2344 1976 a25d5af9c92132698e2550c7e7a9bcfc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25d5af9c92132698e2550c7e7a9bcfc.exe"C:\Users\Admin\AppData\Local\Temp\a25d5af9c92132698e2550c7e7a9bcfc.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\ife.txt "C:\PROGRA~1\INTERN~1\ieframe.dll" /a2⤵
- Drops file in Program Files directory
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19.5MB
MD53cacbd4caae9dcbf0c94ac98d5014ac6
SHA18f6d4c899c69880c0baad32f18f8c4b5f9467fa9
SHA256c6c99cf1e28a9fd603e110e177844dfd78bd552bb67130243d68c4b0e4928b3e
SHA5128a4ca2242f556107a4a28c648306481698c1031d71c3708b9e10468905ad228cf8d61cba243a22d78cad6117f93c261e6d7f520c5a710093da791ba08afbc9c9
-
Filesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53