Analysis
-
max time kernel
70s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
c80ac7fd36d2a530d236883aa208f109.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c80ac7fd36d2a530d236883aa208f109.exe
Resource
win10v2004-20240226-en
General
-
Target
c80ac7fd36d2a530d236883aa208f109.exe
-
Size
885KB
-
MD5
c80ac7fd36d2a530d236883aa208f109
-
SHA1
b9a5602cf794e19048127dda53597c1ce14ce897
-
SHA256
c09f66feda1ec50b90083001b2bafd0da5305814f06315f45908ad185ffff2c4
-
SHA512
91579252ef42b95269141c03c760b7b8d3f9f41b623d3abf51511822ba0fb595b79eb7a986de04b13d266d417523526fec28ddcc85e99ff9c2ae9c3e24007d4f
-
SSDEEP
24576:vqykjjSlAwD73v+3edhds3c9RfOXPSKrH2njzPjd:vDplAw3f0wIsffaSKrH2jN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 8700_100.exe -
Loads dropped DLL 1 IoCs
pid Process 1912 c80ac7fd36d2a530d236883aa208f109.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: 33 1912 c80ac7fd36d2a530d236883aa208f109.exe Token: SeIncBasePriorityPrivilege 1912 c80ac7fd36d2a530d236883aa208f109.exe Token: 33 1912 c80ac7fd36d2a530d236883aa208f109.exe Token: SeIncBasePriorityPrivilege 1912 c80ac7fd36d2a530d236883aa208f109.exe Token: 33 1912 c80ac7fd36d2a530d236883aa208f109.exe Token: SeIncBasePriorityPrivilege 1912 c80ac7fd36d2a530d236883aa208f109.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe Token: 33 2644 8700_100.exe Token: SeIncBasePriorityPrivilege 2644 8700_100.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2644 1912 c80ac7fd36d2a530d236883aa208f109.exe 28 PID 1912 wrote to memory of 2644 1912 c80ac7fd36d2a530d236883aa208f109.exe 28 PID 1912 wrote to memory of 2644 1912 c80ac7fd36d2a530d236883aa208f109.exe 28 PID 1912 wrote to memory of 2644 1912 c80ac7fd36d2a530d236883aa208f109.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c80ac7fd36d2a530d236883aa208f109.exe"C:\Users\Admin\AppData\Local\Temp\c80ac7fd36d2a530d236883aa208f109.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
\DEVICE\HARDDISKVOLUME2\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.05.17T21.04\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\8700_100.exe"C:\Users\Admin\AppData\Local\Temp\8700_100.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2011.05.17T21.04\Virtual\STUBEXE\8.0.1112\@APPDATALOCAL@\Temp\8700_100.exe
Filesize17KB
MD500ddbb46cbfb40619d89f23c717dc6fe
SHA1cc56bb4628d978493942e39e140b07ac27d9a1f6
SHA2563e18d5c1c5e27b1f359c161e90665e921a32dd461699ed762a4582291428067a
SHA512aa1497729477df5651fd27b1bebf47d89aba4e523dccfacc3f015ff2f7bcd52461b028cd9b55c125e0ecca03d931d60a6c01d74eae21596f42eda367285814ab