Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
c70c5e935d65feca98f77cc2fc392e28.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c70c5e935d65feca98f77cc2fc392e28.exe
Resource
win10v2004-20231215-en
General
-
Target
c70c5e935d65feca98f77cc2fc392e28.exe
-
Size
33KB
-
MD5
c70c5e935d65feca98f77cc2fc392e28
-
SHA1
5cf7dca6b2011590fba81b893686aaeea81a8f37
-
SHA256
f59546a8c41b210af7702fc9f5db9ab19e0e99bbad2e7fb17c26451ddf900689
-
SHA512
576a641bc6fd540a07b265dae11d723acd8c3e565f1d7dcf23f57d71e462acd743be44cbe404bfc8e7c25e8dcd4fed8248c5c93c3eb5522d85c592ac4588caa2
-
SSDEEP
768:xPH4rKS4GDkQBZ3ImWlTtEIRlJ+qFZ2bSgJzANqM3wJJiT:xf4exGDkeZ4mOoSgJEAJJM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1720 c70c5e935d65feca98f77cc2fc392e28.exe Token: SeBackupPrivilege 1720 c70c5e935d65feca98f77cc2fc392e28.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2944 1720 c70c5e935d65feca98f77cc2fc392e28.exe 28 PID 1720 wrote to memory of 2944 1720 c70c5e935d65feca98f77cc2fc392e28.exe 28 PID 1720 wrote to memory of 2944 1720 c70c5e935d65feca98f77cc2fc392e28.exe 28 PID 1720 wrote to memory of 2944 1720 c70c5e935d65feca98f77cc2fc392e28.exe 28 PID 1720 wrote to memory of 2944 1720 c70c5e935d65feca98f77cc2fc392e28.exe 28 PID 1720 wrote to memory of 2944 1720 c70c5e935d65feca98f77cc2fc392e28.exe 28 PID 1720 wrote to memory of 2944 1720 c70c5e935d65feca98f77cc2fc392e28.exe 28 PID 2944 wrote to memory of 2552 2944 cmd.exe 30 PID 2944 wrote to memory of 2552 2944 cmd.exe 30 PID 2944 wrote to memory of 2552 2944 cmd.exe 30 PID 2944 wrote to memory of 2552 2944 cmd.exe 30 PID 2944 wrote to memory of 2552 2944 cmd.exe 30 PID 2944 wrote to memory of 2552 2944 cmd.exe 30 PID 2944 wrote to memory of 2552 2944 cmd.exe 30 PID 2552 wrote to memory of 2524 2552 cmd.exe 32 PID 2552 wrote to memory of 2524 2552 cmd.exe 32 PID 2552 wrote to memory of 2524 2552 cmd.exe 32 PID 2552 wrote to memory of 2524 2552 cmd.exe 32 PID 2552 wrote to memory of 2524 2552 cmd.exe 32 PID 2552 wrote to memory of 2524 2552 cmd.exe 32 PID 2552 wrote to memory of 2524 2552 cmd.exe 32 PID 2524 wrote to memory of 2532 2524 net.exe 33 PID 2524 wrote to memory of 2532 2524 net.exe 33 PID 2524 wrote to memory of 2532 2524 net.exe 33 PID 2524 wrote to memory of 2532 2524 net.exe 33 PID 2524 wrote to memory of 2532 2524 net.exe 33 PID 2524 wrote to memory of 2532 2524 net.exe 33 PID 2524 wrote to memory of 2532 2524 net.exe 33 PID 2552 wrote to memory of 2408 2552 cmd.exe 34 PID 2552 wrote to memory of 2408 2552 cmd.exe 34 PID 2552 wrote to memory of 2408 2552 cmd.exe 34 PID 2552 wrote to memory of 2408 2552 cmd.exe 34 PID 2552 wrote to memory of 2408 2552 cmd.exe 34 PID 2552 wrote to memory of 2408 2552 cmd.exe 34 PID 2552 wrote to memory of 2408 2552 cmd.exe 34 PID 2552 wrote to memory of 2596 2552 cmd.exe 35 PID 2552 wrote to memory of 2596 2552 cmd.exe 35 PID 2552 wrote to memory of 2596 2552 cmd.exe 35 PID 2552 wrote to memory of 2596 2552 cmd.exe 35 PID 2552 wrote to memory of 2596 2552 cmd.exe 35 PID 2552 wrote to memory of 2596 2552 cmd.exe 35 PID 2552 wrote to memory of 2596 2552 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\c70c5e935d65feca98f77cc2fc392e28.exe"C:\Users\Admin\AppData\Local\Temp\c70c5e935d65feca98f77cc2fc392e28.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\dt.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K c:\windows\temp\r.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\net.exenet stop sharedaccess4⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess5⤵PID:2532
-
-
-
C:\Windows\SysWOW64\ftp.exeftp -s:c:\windows\temp\f.txt4⤵PID:2408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K c:\windows\temp\c.bat4⤵PID:2596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57d0eb762b413b74951aeaf9f827abd27
SHA1d74286cbc059b13be3435b794a1ffcc36086d5b3
SHA256856eee0ff6b8b730bd499fcb6547da86b23941222fc04507170ea4775845ba6c
SHA512d7706275e525ee30b38f938c72a4c985054bfe7bd083184d336a4aa1bc4df88d85c341ec1448bac28840e460e2c5619d89aaca8e616358efee2b5f7b4b431433
-
Filesize
35B
MD557825840dd74a802acbefce3d055ede5
SHA16cdf5e84e7f25a2dd7ca8197c46af9f8f600f4e8
SHA2566da483818b7a32e2d9fab191c069a9a04c15d22124969345439edbd6e20b70f4
SHA512a7c46527e6f2c24136351effc7ee0acce1c7b31f67d6b673b6547a31c97f4e988f8b8ab60e40ad5b6d94a2d9df0cef964800a4fb380a41d1ce9b89de47a9cf1a
-
Filesize
79B
MD51302f01cdcbb0f9c80b6f3dfbd242e47
SHA15dc9b4a95020de2bc0bfa17829da6d44c9b6c1b8
SHA256d0b46dd67ee171c1e1b729925f6113639f1d9e9e352f1661b90109c72818589c
SHA5120b3ab58fab71c4da1ef3146d3d66536c710204f997cddcefcfc45dab46e231957eeb92f5b4f1f7d6755a948cb3d41c9acf9691b03ccd25c27e3b708a6a78933d
-
Filesize
219B
MD5a124d413f23742f55bff38537701ecd9
SHA1d0edbd0a8b61ec274f9ac420f1059f8710619da2
SHA256ba40e6953acd601d2132d2202e64c1482f497631ed140bb33b05477f05c85139
SHA512a1d5c8a49ad362f34fb52b93b799711a59742d7f828beddb82ce31f99e305ea9aa4b5b39b73c766fd41079962ad9f9bbe68eca4834e6db68b5dac907862c4773