Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 11:18
Static task
static1
Behavioral task
behavioral1
Sample
abc15af4008e8832a0a6cc6c90bf1599.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abc15af4008e8832a0a6cc6c90bf1599.exe
Resource
win10v2004-20240226-en
General
-
Target
abc15af4008e8832a0a6cc6c90bf1599.exe
-
Size
724KB
-
MD5
abc15af4008e8832a0a6cc6c90bf1599
-
SHA1
66ccce6161849dd40d20bf1b5b30f2ee4cd74bd2
-
SHA256
9b2b1e301bed2e080fb835aece6d2644b1ca3b5b673b34617bc6c0f378307d5a
-
SHA512
faf4ba5cf6f5782b9b4dea6e2320ef6dfc207c011682f03b90a3430b43844c18ca3b2634ff040783f7575f065794284968185d86639dec48c3fac3febf10a872
-
SSDEEP
12288:uxHjL99LsEONTlqagN59/2MzTcDYOtygo2ZJTaR6fHl6vKP2rUi6K6aKUUifD0:aL99wBTlqagH12OcDYOogo23WR6fJPSK
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2384 server_se.exe 2936 ¼Ò³àsa.exe 2472 conzrz.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\conzrz.exe server_se.exe File opened for modification C:\Windows\SysWOW64\conzrz.exe server_se.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2384 server_se.exe 2384 server_se.exe 2384 server_se.exe 2384 server_se.exe 2384 server_se.exe 2384 server_se.exe 2384 server_se.exe 2384 server_se.exe 2384 server_se.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2384 server_se.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 832 wrote to memory of 2384 832 abc15af4008e8832a0a6cc6c90bf1599.exe 28 PID 832 wrote to memory of 2384 832 abc15af4008e8832a0a6cc6c90bf1599.exe 28 PID 832 wrote to memory of 2384 832 abc15af4008e8832a0a6cc6c90bf1599.exe 28 PID 832 wrote to memory of 2384 832 abc15af4008e8832a0a6cc6c90bf1599.exe 28 PID 832 wrote to memory of 2384 832 abc15af4008e8832a0a6cc6c90bf1599.exe 28 PID 832 wrote to memory of 2384 832 abc15af4008e8832a0a6cc6c90bf1599.exe 28 PID 832 wrote to memory of 2384 832 abc15af4008e8832a0a6cc6c90bf1599.exe 28 PID 832 wrote to memory of 2936 832 abc15af4008e8832a0a6cc6c90bf1599.exe 29 PID 832 wrote to memory of 2936 832 abc15af4008e8832a0a6cc6c90bf1599.exe 29 PID 832 wrote to memory of 2936 832 abc15af4008e8832a0a6cc6c90bf1599.exe 29 PID 832 wrote to memory of 2936 832 abc15af4008e8832a0a6cc6c90bf1599.exe 29 PID 832 wrote to memory of 2936 832 abc15af4008e8832a0a6cc6c90bf1599.exe 29 PID 832 wrote to memory of 2936 832 abc15af4008e8832a0a6cc6c90bf1599.exe 29 PID 832 wrote to memory of 2936 832 abc15af4008e8832a0a6cc6c90bf1599.exe 29 PID 2384 wrote to memory of 2208 2384 server_se.exe 32 PID 2384 wrote to memory of 2208 2384 server_se.exe 32 PID 2384 wrote to memory of 2208 2384 server_se.exe 32 PID 2384 wrote to memory of 2208 2384 server_se.exe 32 PID 2384 wrote to memory of 2208 2384 server_se.exe 32 PID 2384 wrote to memory of 2208 2384 server_se.exe 32 PID 2384 wrote to memory of 2208 2384 server_se.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\abc15af4008e8832a0a6cc6c90bf1599.exe"C:\Users\Admin\AppData\Local\Temp\abc15af4008e8832a0a6cc6c90bf1599.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\server_se.exe"C:\server_se.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\SERVER~1.EXE > nul3⤵PID:2208
-
-
-
C:\¼Ò³àsa.exe"C:\¼Ò³àsa.exe"2⤵
- Executes dropped EXE
PID:2936
-
-
C:\Windows\SysWOW64\conzrz.exeC:\Windows\SysWOW64\conzrz.exe1⤵
- Executes dropped EXE
PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD525b839ba896917b0e8f29cb76daad781
SHA1ba5d8c46534c38fec877ac7f972fc53516f5d120
SHA2566914efea0c5bef4396dd9a548e5a12e21fa9ed7cdd4f5cd8ff5f3342510f292a
SHA5120fc51a1ceaa6fde84e5defc83e7d5e284bad9d84d34948a62c98ea9091123c7c00df28b347c545e0df0eb3151ba121acd64b9778c2fec2ab95ea22ac7cead084
-
Filesize
384KB
MD5ae2381b00c6fddd48a3aa2b2f6245df7
SHA1caa4b850ff9f0d9c4aaf4ba7cf4190594035799f
SHA2564d2fbd0727086715331680c06a2a79fd3ed1b003ea1386fab97f0d0fd878c653
SHA51222c6d2eaeb1b96320171377cdc49cb0713430ca85fdecde108730d0a21bc96c43c11b0680505d12632d42100ee7a214dd005d490c3706135368246ea16d2d1a5