Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
a2ebd7fe2f9753f954c293d6a0cabe66.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a2ebd7fe2f9753f954c293d6a0cabe66.exe
Resource
win10v2004-20240221-en
General
-
Target
a2ebd7fe2f9753f954c293d6a0cabe66.exe
-
Size
288KB
-
MD5
a2ebd7fe2f9753f954c293d6a0cabe66
-
SHA1
56d824a6c1e10025267183897b3e406d3587c485
-
SHA256
43738796c32a07ac0c87cc779ab8ec1afc78822f8148b1faa08fae13861e7bad
-
SHA512
ab46995faacdaa66f962264c5d1f788505b2812c16e71604685137ee84a03f8577d8c93914251a6d5aece8cfd100291bd07d66bffa148c2f17af0303017c908b
-
SSDEEP
6144:Ep5WdB741An01p5WfMWFbCXCe0SNDCHyetwxSWnlhZ9E+RtmA9Btn6UW9Hv6SYcv:Ep5Wdp41An01p5YtShLE+Rtpvn6TJBY2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2288 msn_explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 1656 a2ebd7fe2f9753f954c293d6a0cabe66.exe 1656 a2ebd7fe2f9753f954c293d6a0cabe66.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\msn_explorer.exe a2ebd7fe2f9753f954c293d6a0cabe66.exe File opened for modification C:\Windows\SysWOW64\msn_explorer.exe a2ebd7fe2f9753f954c293d6a0cabe66.exe File created C:\Windows\SysWOW64\msn_explorer.exe msn_explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1656 a2ebd7fe2f9753f954c293d6a0cabe66.exe Token: SeIncBasePriorityPrivilege 2288 msn_explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2288 1656 a2ebd7fe2f9753f954c293d6a0cabe66.exe 28 PID 1656 wrote to memory of 2288 1656 a2ebd7fe2f9753f954c293d6a0cabe66.exe 28 PID 1656 wrote to memory of 2288 1656 a2ebd7fe2f9753f954c293d6a0cabe66.exe 28 PID 1656 wrote to memory of 2288 1656 a2ebd7fe2f9753f954c293d6a0cabe66.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2ebd7fe2f9753f954c293d6a0cabe66.exe"C:\Users\Admin\AppData\Local\Temp\a2ebd7fe2f9753f954c293d6a0cabe66.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\msn_explorer.exeC:\Windows\system32\msn_explorer.exe C:\Users\Admin\AppData\Local\Temp\a2ebd7fe2f9753f954c293d6a0cabe66.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5a2ebd7fe2f9753f954c293d6a0cabe66
SHA156d824a6c1e10025267183897b3e406d3587c485
SHA25643738796c32a07ac0c87cc779ab8ec1afc78822f8148b1faa08fae13861e7bad
SHA512ab46995faacdaa66f962264c5d1f788505b2812c16e71604685137ee84a03f8577d8c93914251a6d5aece8cfd100291bd07d66bffa148c2f17af0303017c908b