Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 03:50
Static task
static1
Behavioral task
behavioral1
Sample
c26181a2d565266641c9870cc7cd8fd0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c26181a2d565266641c9870cc7cd8fd0.exe
Resource
win10v2004-20240226-en
General
-
Target
c26181a2d565266641c9870cc7cd8fd0.exe
-
Size
326KB
-
MD5
c26181a2d565266641c9870cc7cd8fd0
-
SHA1
32ad7025eaeb8e341eed34b4c00f12edae7777fd
-
SHA256
c3a750221a703ce3cf8d451de6cde6344953fbef924f4db9b4875a46a78e0f71
-
SHA512
70b77c394d05f6a2e6c1809f007c5421f311c54180a0d291077829461b1c4bf2966ea77a595c86313a31f517243e76f0b5c9a3f424e1e03f9dc2120a091efd54
-
SSDEEP
6144:h7F2idZecnl20lHRxp3gRp5qPjyzoBBgkrYNkO//PxzeP4zmDVhxp:/F3Z4mxxe7qPjyzgBLrkR/ZzeQK3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3044 c26181a2d565266641c9870cc7cd8fd0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\c26181a2d565266641c9870cc7cd8fd0.exe c26181a2d565266641c9870cc7cd8fd0.exe File opened for modification C:\Windows\SysWOW64\c26181a2d565266641c9870cc7cd8fd0.exe c26181a2d565266641c9870cc7cd8fd0.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 3064 c26181a2d565266641c9870cc7cd8fd0.exe 3064 c26181a2d565266641c9870cc7cd8fd0.exe 3064 c26181a2d565266641c9870cc7cd8fd0.exe 3064 c26181a2d565266641c9870cc7cd8fd0.exe 3064 c26181a2d565266641c9870cc7cd8fd0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3064 c26181a2d565266641c9870cc7cd8fd0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2644 3064 c26181a2d565266641c9870cc7cd8fd0.exe 29 PID 3064 wrote to memory of 2644 3064 c26181a2d565266641c9870cc7cd8fd0.exe 29 PID 3064 wrote to memory of 2644 3064 c26181a2d565266641c9870cc7cd8fd0.exe 29 PID 3064 wrote to memory of 2644 3064 c26181a2d565266641c9870cc7cd8fd0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c26181a2d565266641c9870cc7cd8fd0.exe"C:\Users\Admin\AppData\Local\Temp\c26181a2d565266641c9870cc7cd8fd0.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\C26181~1.EXE > nul2⤵PID:2644
-
-
C:\Windows\SysWOW64\c26181a2d565266641c9870cc7cd8fd0.exeC:\Windows\SysWOW64\c26181a2d565266641c9870cc7cd8fd0.exe1⤵
- Executes dropped EXE
PID:3044
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD5c26181a2d565266641c9870cc7cd8fd0
SHA132ad7025eaeb8e341eed34b4c00f12edae7777fd
SHA256c3a750221a703ce3cf8d451de6cde6344953fbef924f4db9b4875a46a78e0f71
SHA51270b77c394d05f6a2e6c1809f007c5421f311c54180a0d291077829461b1c4bf2966ea77a595c86313a31f517243e76f0b5c9a3f424e1e03f9dc2120a091efd54