Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 01:48
Behavioral task
behavioral1
Sample
b635cb762f5c97f4947790cf8313a8a0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b635cb762f5c97f4947790cf8313a8a0.exe
Resource
win10v2004-20240226-en
General
-
Target
b635cb762f5c97f4947790cf8313a8a0.exe
-
Size
6KB
-
MD5
b635cb762f5c97f4947790cf8313a8a0
-
SHA1
675e9f7a9b6e28007bf96e35b04e58b434f013fa
-
SHA256
8843cd13afdefa87bf1ec52f889538a2a653e4adaf31538d67c60ea4951f6c66
-
SHA512
a3a18c9fb3c99220a78550e410c405d31c72ef44b4f12b7f22e161bc1a681f16650ac8b68cc092f2ef36700ab930ec0b6bb653379caf14c20a4283bd00957c0c
-
SSDEEP
96:qqJLaoC6yKe+gcnBh2yQXYpzwDy40YTj/8CEeb+P0QlglyNgKRMTmO:hJLwQzj2yQ/H0cwCE4NQioNgKOTmO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3496-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3496-3-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3496 b635cb762f5c97f4947790cf8313a8a0.exe 3496 b635cb762f5c97f4947790cf8313a8a0.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3496 b635cb762f5c97f4947790cf8313a8a0.exe Token: SeLoadDriverPrivilege 3496 b635cb762f5c97f4947790cf8313a8a0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3496 wrote to memory of 3544 3496 b635cb762f5c97f4947790cf8313a8a0.exe 57 PID 3496 wrote to memory of 3988 3496 b635cb762f5c97f4947790cf8313a8a0.exe 89 PID 3496 wrote to memory of 3988 3496 b635cb762f5c97f4947790cf8313a8a0.exe 89 PID 3496 wrote to memory of 3988 3496 b635cb762f5c97f4947790cf8313a8a0.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\b635cb762f5c97f4947790cf8313a8a0.exe"C:\Users\Admin\AppData\Local\Temp\b635cb762f5c97f4947790cf8313a8a0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Del.Bat"3⤵PID:3988
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192B
MD5cba7c6fa0107d02a98116df731420252
SHA19243981065ba782be5e483fb2687e0564613c624
SHA25691dac66e666cb4b3d9dc801d592b6057b066896510b5eea1e0518290f03b9cc8
SHA51277ff8ec7cffde95990fd29264becdb7dcbdca6c786f0d51193e159bc6968fe9542e958634c17645d7371da88b87766984347f81f1357c565d66316ab1f812106