Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
c27e7366dc380e8a980d15d843fc4b1a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c27e7366dc380e8a980d15d843fc4b1a.exe
Resource
win10v2004-20240226-en
General
-
Target
c27e7366dc380e8a980d15d843fc4b1a.exe
-
Size
672KB
-
MD5
c27e7366dc380e8a980d15d843fc4b1a
-
SHA1
8c903c4465c7a0ca9443c07faa43c9f0f24740ae
-
SHA256
77934c09b0f714b5e39d1f58b58a6d8e6a306d88ed9a3e9a7f1481562c622833
-
SHA512
ef19d071d38db824c80d26bf121e06d7bdf619bc6cb3d7978ea001033b42aad886a77bde4eed31edf9b7b4a7bb47c998195ecf8e0cdbb73da3b140f15d9cd26e
-
SSDEEP
12288:+qgu1Jn/TzDt5MvDW1bAuKUStM0lbF3Z4mxxiM6d7vE/3sP9G:DgsztWDW1bB3StM0hQmXH6d7s/t
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 5012 SERVER~1.EXE 1288 Hacker.com.cn.ini 2244 SERVER~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c27e7366dc380e8a980d15d843fc4b1a.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.ini SERVER~1.EXE File opened for modification C:\Windows\Hacker.com.cn.ini SERVER~1.EXE File opened for modification C:\Windows\Hacker.com.cn.ini SERVER~1.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5012 SERVER~1.EXE Token: SeDebugPrivilege 1288 Hacker.com.cn.ini Token: SeDebugPrivilege 2244 SERVER~1.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1288 Hacker.com.cn.ini -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3228 wrote to memory of 5012 3228 c27e7366dc380e8a980d15d843fc4b1a.exe 90 PID 3228 wrote to memory of 5012 3228 c27e7366dc380e8a980d15d843fc4b1a.exe 90 PID 3228 wrote to memory of 5012 3228 c27e7366dc380e8a980d15d843fc4b1a.exe 90 PID 1288 wrote to memory of 3336 1288 Hacker.com.cn.ini 95 PID 1288 wrote to memory of 3336 1288 Hacker.com.cn.ini 95 PID 3228 wrote to memory of 2244 3228 c27e7366dc380e8a980d15d843fc4b1a.exe 96 PID 3228 wrote to memory of 2244 3228 c27e7366dc380e8a980d15d843fc4b1a.exe 96 PID 3228 wrote to memory of 2244 3228 c27e7366dc380e8a980d15d843fc4b1a.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c27e7366dc380e8a980d15d843fc4b1a.exe"C:\Users\Admin\AppData\Local\Temp\c27e7366dc380e8a980d15d843fc4b1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\Hacker.com.cn.iniC:\Windows\Hacker.com.cn.ini1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
743KB
MD5c4a941b370fb187778053ccfd90b86ad
SHA1531f3f329dd42a43e557b07622a3c4e040fbe23c
SHA2560ed331be9ad348f2ee2cf63029f2c74673bd3a82671eef9b2faeaad7617d1bc5
SHA512e1e2ef5ef0448f1ab4013a558f9dd1cb7e69b054342dac57ecce3e369a9e062340bd0ba872b5514707b5f03fe5c7fb227f9e5bffef945d94bc9c7d271c44bada