Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
b68a70c7f715162ba2ab0231463bc25a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b68a70c7f715162ba2ab0231463bc25a.exe
Resource
win10v2004-20240226-en
General
-
Target
b68a70c7f715162ba2ab0231463bc25a.exe
-
Size
652KB
-
MD5
b68a70c7f715162ba2ab0231463bc25a
-
SHA1
2bc2b141a5e0ee575e7f5f76debdeebfb9b3b38e
-
SHA256
def4fa1479486667788cb7a0c1a193fb57a87a535f745cc55af41ad473ac38fd
-
SHA512
e920648be3f28742f51b5b1f8758e791511c3387761aedb7e2f180f7285588c2b452a96198f6c93de826486adf254cb861cd5ef84346f50d8e26b79fd8cf8b86
-
SSDEEP
12288:J/IXt3Ax4NnTm5RtDOcX1n+eE0TBnazyIxHV1t868+hi8ZTCGfyi:hI93cqna5Rt6cX1n+ezTBnaht/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2504 taskgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2732 b68a70c7f715162ba2ab0231463bc25a.exe 2732 b68a70c7f715162ba2ab0231463bc25a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\taskgr.exe = "C:\\Windows\\system32\\taskgr.exe" b68a70c7f715162ba2ab0231463bc25a.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskgr.exe b68a70c7f715162ba2ab0231463bc25a.exe File opened for modification C:\Windows\SysWOW64\taskgr.exe b68a70c7f715162ba2ab0231463bc25a.exe File created C:\Windows\SysWOW64\taskgr.exe taskgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2732 b68a70c7f715162ba2ab0231463bc25a.exe Token: SeIncBasePriorityPrivilege 2732 b68a70c7f715162ba2ab0231463bc25a.exe Token: SeIncBasePriorityPrivilege 2504 taskgr.exe Token: SeIncBasePriorityPrivilege 2504 taskgr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2504 2732 b68a70c7f715162ba2ab0231463bc25a.exe 28 PID 2732 wrote to memory of 2504 2732 b68a70c7f715162ba2ab0231463bc25a.exe 28 PID 2732 wrote to memory of 2504 2732 b68a70c7f715162ba2ab0231463bc25a.exe 28 PID 2732 wrote to memory of 2504 2732 b68a70c7f715162ba2ab0231463bc25a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b68a70c7f715162ba2ab0231463bc25a.exe"C:\Users\Admin\AppData\Local\Temp\b68a70c7f715162ba2ab0231463bc25a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\taskgr.exeC:\Windows\system32\taskgr.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652KB
MD5b68a70c7f715162ba2ab0231463bc25a
SHA12bc2b141a5e0ee575e7f5f76debdeebfb9b3b38e
SHA256def4fa1479486667788cb7a0c1a193fb57a87a535f745cc55af41ad473ac38fd
SHA512e920648be3f28742f51b5b1f8758e791511c3387761aedb7e2f180f7285588c2b452a96198f6c93de826486adf254cb861cd5ef84346f50d8e26b79fd8cf8b86