Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
bde0ce12bb2575d9a2badb873a94de28.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bde0ce12bb2575d9a2badb873a94de28.exe
Resource
win10v2004-20240226-en
General
-
Target
bde0ce12bb2575d9a2badb873a94de28.exe
-
Size
740KB
-
MD5
bde0ce12bb2575d9a2badb873a94de28
-
SHA1
e7ec059cc8994161344a2df0a16724aa541a3428
-
SHA256
d6d9d4b2f14436eebf5dae08b6f34e4d01d89ae953eba5c49d4a4ee792b6b1a1
-
SHA512
afde43b5a5f8de5b3aea273fdba090b69a56a3fb9f45b46943a6d61b59c56d4f2d850e526af59aa5a31125e6ba5ea5f69ae3d4ffe784ba296702ac34a27abaaf
-
SSDEEP
12288:efW5XZbiCoG3Iq9pkg/Bz6fGF3Z4mxx1QUDwC9Aoc:efS8CoGr9ag/EfGQmX1QUMP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1876 junzai.exe -
Loads dropped DLL 2 IoCs
pid Process 1548 bde0ce12bb2575d9a2badb873a94de28.exe 1548 bde0ce12bb2575d9a2badb873a94de28.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ieapfltr.dat bde0ce12bb2575d9a2badb873a94de28.exe File created C:\Windows\SysWOW64\junzai.exe bde0ce12bb2575d9a2badb873a94de28.exe File opened for modification C:\Windows\SysWOW64\junzai.exe bde0ce12bb2575d9a2badb873a94de28.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1548 bde0ce12bb2575d9a2badb873a94de28.exe Token: SeDebugPrivilege 1876 junzai.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1548 wrote to memory of 1876 1548 bde0ce12bb2575d9a2badb873a94de28.exe 28 PID 1548 wrote to memory of 1876 1548 bde0ce12bb2575d9a2badb873a94de28.exe 28 PID 1548 wrote to memory of 1876 1548 bde0ce12bb2575d9a2badb873a94de28.exe 28 PID 1548 wrote to memory of 1876 1548 bde0ce12bb2575d9a2badb873a94de28.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde0ce12bb2575d9a2badb873a94de28.exe"C:\Users\Admin\AppData\Local\Temp\bde0ce12bb2575d9a2badb873a94de28.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\junzai.exeC:\Windows\System32\junzai.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740KB
MD5bde0ce12bb2575d9a2badb873a94de28
SHA1e7ec059cc8994161344a2df0a16724aa541a3428
SHA256d6d9d4b2f14436eebf5dae08b6f34e4d01d89ae953eba5c49d4a4ee792b6b1a1
SHA512afde43b5a5f8de5b3aea273fdba090b69a56a3fb9f45b46943a6d61b59c56d4f2d850e526af59aa5a31125e6ba5ea5f69ae3d4ffe784ba296702ac34a27abaaf