Overview
overview
7Static
static
30625f84f17...ba.exe
windows7-x64
70625f84f17...ba.exe
windows10-2004-x64
7$PLUGINSDI...SC.dll
windows7-x64
3$PLUGINSDI...SC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ss.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows10-2004-x64
3file.bat
windows7-x64
1file.bat
windows10-2004-x64
1mgxitt.exe
windows7-x64
1mgxitt.exe
windows10-2004-x64
1Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
0625f84f174f72e98cb67251a549638b8997012701ae7e47d6fa348567bfd7ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0625f84f174f72e98cb67251a549638b8997012701ae7e47d6fa348567bfd7ba.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SimpleSC.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
file.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
file.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
mgxitt.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
mgxitt.exe
Resource
win10v2004-20240226-en
General
-
Target
file.bat
-
Size
104B
-
MD5
f153d51505dbb3e9a190aae6a7269a72
-
SHA1
9d9c99e0142f200c00e8a4dcc65eeecfaa3cc17e
-
SHA256
19591e0a956e524775f97d628f897883e99a57cb845eab24a1be9a172bd6f458
-
SHA512
5c30328972573203cdfc65f9f435f7e720c7d45bc073f1971d706a112e780064416418e922b0078c78d4c5c0b798810667a5cf610bbe03472ee4e981eac08dfc
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 1944 mgxitt.exe Token: 35 1944 mgxitt.exe Token: SeSecurityPrivilege 1944 mgxitt.exe Token: SeSecurityPrivilege 1944 mgxitt.exe Token: SeRestorePrivilege 3420 mgxitt.exe Token: 35 3420 mgxitt.exe Token: SeSecurityPrivilege 3420 mgxitt.exe Token: SeSecurityPrivilege 3420 mgxitt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 8 wrote to memory of 1944 8 cmd.exe 88 PID 8 wrote to memory of 1944 8 cmd.exe 88 PID 8 wrote to memory of 1944 8 cmd.exe 88 PID 8 wrote to memory of 3420 8 cmd.exe 91 PID 8 wrote to memory of 3420 8 cmd.exe 91 PID 8 wrote to memory of 3420 8 cmd.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\file.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\mgxitt.exemgxitt.exe x oxsbaszf.dll -p1234567892⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\mgxitt.exemgxitt.exe x uwaufnjs.dat -p1234567892⤵
- Suspicious use of AdjustPrivilegeToken
PID:3420
-