Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
b4d1714f0d15ef16bdd37d70c341bee4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4d1714f0d15ef16bdd37d70c341bee4.exe
Resource
win10v2004-20240226-en
General
-
Target
b4d1714f0d15ef16bdd37d70c341bee4.exe
-
Size
57KB
-
MD5
b4d1714f0d15ef16bdd37d70c341bee4
-
SHA1
34c6fda5c4ad6d5616b6c777345598685c11d1a0
-
SHA256
ad88e817890d49d82f221a0b7b6cdb63c0fabb5da0c57f727997f133acae2a28
-
SHA512
0b6433a15e9c0f5b41dbf154de65f4f542c1e35115fa59aa3085c9ff210a4b352f8b11796dd63d4c17930889312835e43f3a481a4debd1e599f6271c15494363
-
SSDEEP
1536:WqBwbLWJLJFKqAZzrZA4kJJIlAfEXhZPESdD3hb:WqBFJLzgOJJEw0Z8SdD3p
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe File opened for modification C:\PROGRA~1\INTERN~1\ieframe.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe Token: SeBackupPrivilege 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2892 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 28 PID 1048 wrote to memory of 2892 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 28 PID 1048 wrote to memory of 2892 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 28 PID 1048 wrote to memory of 2892 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 28 PID 1048 wrote to memory of 2892 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 28 PID 1048 wrote to memory of 2892 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 28 PID 1048 wrote to memory of 2892 1048 b4d1714f0d15ef16bdd37d70c341bee4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4d1714f0d15ef16bdd37d70c341bee4.exe"C:\Users\Admin\AppData\Local\Temp\b4d1714f0d15ef16bdd37d70c341bee4.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy C:\Users\Admin\AppData\Local\Temp\ife.txt "C:\PROGRA~1\INTERN~1\ieframe.dll" /a2⤵
- Drops file in Program Files directory
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19.4MB
MD5cefd6637349d1703fb8f8c6cdf43fa49
SHA1cffc28bc6a77056e94943f232e02547037a472fe
SHA2561b29d1101bfe79d895b3b87d927ee708a6845c76cf1fa6db42d3efe916bee353
SHA512b23a1a7c0cb8ec3e71925855785368016dded837caffb3e274c847573a1cf7a9e14fb563aa9b1c56acce5823c48b5d2c3304bab2aa3f4a4246b553752e220cb7
-
Filesize
6KB
MD5e54eb27fb5048964e8d1ec7a1f72334b
SHA12b76d7aedafd724de96532b00fbc6c7c370e4609
SHA256ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824
SHA512c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53