Analysis
-
max time kernel
153s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
c4d9d92d02453ba90ce7cb7dd36129c6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4d9d92d02453ba90ce7cb7dd36129c6.exe
Resource
win10v2004-20240226-en
General
-
Target
c4d9d92d02453ba90ce7cb7dd36129c6.exe
-
Size
225KB
-
MD5
c4d9d92d02453ba90ce7cb7dd36129c6
-
SHA1
bf19f1a04314688314fa2b53df67bf02b6e62750
-
SHA256
529b1e59756b3db5e47e11801940a85a90ecb84771f480fc08a0979ed3a942ce
-
SHA512
84e979427fb9202249c3db7d87482639827c03da78b595801a6b3f9aa3d41f437babcae604c3b55b99c8175649ec6cc3ebc88db4b72f3bd3386e73999be8f7ff
-
SSDEEP
3072:d3QfUsjDosf+UtmBgajmOPXqAYYccKAl0gPXJ/H9RSAYijDmRJ:B6mSimOPXqAYhC5PXJf9RSiuL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2244 lsxtjf.exe -
Loads dropped DLL 4 IoCs
pid Process 2820 cmd.exe 2820 cmd.exe 2244 lsxtjf.exe 2244 lsxtjf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3008 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2528 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2244 lsxtjf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2244 lsxtjf.exe 2244 lsxtjf.exe 2244 lsxtjf.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2244 lsxtjf.exe 2244 lsxtjf.exe 2244 lsxtjf.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2820 2964 c4d9d92d02453ba90ce7cb7dd36129c6.exe 28 PID 2964 wrote to memory of 2820 2964 c4d9d92d02453ba90ce7cb7dd36129c6.exe 28 PID 2964 wrote to memory of 2820 2964 c4d9d92d02453ba90ce7cb7dd36129c6.exe 28 PID 2964 wrote to memory of 2820 2964 c4d9d92d02453ba90ce7cb7dd36129c6.exe 28 PID 2820 wrote to memory of 3008 2820 cmd.exe 30 PID 2820 wrote to memory of 3008 2820 cmd.exe 30 PID 2820 wrote to memory of 3008 2820 cmd.exe 30 PID 2820 wrote to memory of 3008 2820 cmd.exe 30 PID 2820 wrote to memory of 2528 2820 cmd.exe 32 PID 2820 wrote to memory of 2528 2820 cmd.exe 32 PID 2820 wrote to memory of 2528 2820 cmd.exe 32 PID 2820 wrote to memory of 2528 2820 cmd.exe 32 PID 2820 wrote to memory of 2244 2820 cmd.exe 33 PID 2820 wrote to memory of 2244 2820 cmd.exe 33 PID 2820 wrote to memory of 2244 2820 cmd.exe 33 PID 2820 wrote to memory of 2244 2820 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d9d92d02453ba90ce7cb7dd36129c6.exe"C:\Users\Admin\AppData\Local\Temp\c4d9d92d02453ba90ce7cb7dd36129c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2964 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\c4d9d92d02453ba90ce7cb7dd36129c6.exe" & start C:\Users\Admin\AppData\Local\lsxtjf.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 29643⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2528
-
-
C:\Users\Admin\AppData\Local\lsxtjf.exeC:\Users\Admin\AppData\Local\lsxtjf.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD55d99797c1573510a6fe10302f52c5722
SHA1afcba9078237faaca26d3bb066c10afb5356bae5
SHA2563e869b908e007b85357c862867bf39173c9b7a63d7056158fd23b39a8317d077
SHA5126c9e5d9a2bf8c453117bc1e126e3f9cc544c3a65875a008edb1b0df721c3cde9a10fc6c177c588d027ea370852a34492af11b569c376323575ea6386ea8bded2
-
Filesize
42KB
MD5dbb0e7c66a805bec118906036cfa07a6
SHA1c6df50038befce6e2ed5d9c57bff0273f7611b29
SHA256a94d73f52ead05b24eb47aa6ce47b725d502f95ff1f341b0d99fa8b2e219ac17
SHA5128698dfd5e919dbb4e30c8ecd0d1d013c958c132cded37c82057d702209305d308e700798651ff9528b6058b7e1f4434b4dd2fd0d498d99735bdf16a684e5c52b
-
Filesize
225KB
MD5c4d9d92d02453ba90ce7cb7dd36129c6
SHA1bf19f1a04314688314fa2b53df67bf02b6e62750
SHA256529b1e59756b3db5e47e11801940a85a90ecb84771f480fc08a0979ed3a942ce
SHA51284e979427fb9202249c3db7d87482639827c03da78b595801a6b3f9aa3d41f437babcae604c3b55b99c8175649ec6cc3ebc88db4b72f3bd3386e73999be8f7ff
-
Filesize
64KB
MD5f0ae26465d6a042f4bfd3ed3c49f272e
SHA1db3e90105036fa68d18ad3dd6b70c46169eb2812
SHA256c614e73d0747df184ad7122759b784017d9c49a90f260f67f4ceaa1cdc4549e5
SHA512828af7c3e98b18508f8ea2f82efe7f68b15388a1e1fa1aa08bf99715abe02e7e7769eee917a3071fb58ec330745cf4ad0f44d6f707a2455ee50e4c90a129dccc