Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 14:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc.exe
-
Size
1.4MB
-
MD5
f2cccd03241bca865d9960ebf32e7784
-
SHA1
0ca4749eec2979250a9f7eff3d07f9677c137180
-
SHA256
6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc
-
SHA512
f789e4c4098b514d924c429ef4ded9fb3e09d34fad64064ec275a68f4c9dc5bebdeff2d0b9d2efa9fdfbbb35274ba863400c8f56571aafe4ff41fa759bb45977
-
SSDEEP
12288:4JP43OEedMGYbDIg+970AxJLgAqdAK5g/59FzkYRC8y2ymsRX4fRjYtYKLbMB2i:mP4AYbDIg++guxdAKq31/yajyw
Score
6/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2968 6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc.exe"C:\Users\Admin\AppData\Local\Temp\6b99acfd878e0fdfc56db661cc53b6fefcf0e0d70c865272c3bb67d9fa9203bc.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2968