Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
cb9b368e317d4ea44000bfb64abca924.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb9b368e317d4ea44000bfb64abca924.exe
Resource
win10v2004-20231215-en
General
-
Target
cb9b368e317d4ea44000bfb64abca924.exe
-
Size
532KB
-
MD5
cb9b368e317d4ea44000bfb64abca924
-
SHA1
d436511b9fa069d98d947312f1b12252356673b4
-
SHA256
bbfe0fe3007141df44faec7db1a930169a0bdee1f71ed7f5b8e2e1e3c6800c0c
-
SHA512
0d159609f35460b58aa846fba6599f5c9b268e83b59cd31ea0f48ce1a2cc2a6cd94df41f290d240de9c7bd9a9cfa1dc17e31848dfc6b421c6cb26434b47dfb43
-
SSDEEP
12288:pkten5HWfyWEAbuSZhrKvxDHQo30veuBfqUFlh:pAenhWEAbuSbtRGuBiiD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2548 22qq.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\22qq.exe cb9b368e317d4ea44000bfb64abca924.exe File opened for modification C:\Windows\22qq.exe cb9b368e317d4ea44000bfb64abca924.exe File created C:\Windows\uninstal.bat cb9b368e317d4ea44000bfb64abca924.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2180 cb9b368e317d4ea44000bfb64abca924.exe Token: SeDebugPrivilege 2548 22qq.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2548 22qq.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2676 2180 cb9b368e317d4ea44000bfb64abca924.exe 30 PID 2180 wrote to memory of 2676 2180 cb9b368e317d4ea44000bfb64abca924.exe 30 PID 2180 wrote to memory of 2676 2180 cb9b368e317d4ea44000bfb64abca924.exe 30 PID 2180 wrote to memory of 2676 2180 cb9b368e317d4ea44000bfb64abca924.exe 30 PID 2180 wrote to memory of 2676 2180 cb9b368e317d4ea44000bfb64abca924.exe 30 PID 2180 wrote to memory of 2676 2180 cb9b368e317d4ea44000bfb64abca924.exe 30 PID 2180 wrote to memory of 2676 2180 cb9b368e317d4ea44000bfb64abca924.exe 30 PID 2548 wrote to memory of 3040 2548 22qq.exe 29 PID 2548 wrote to memory of 3040 2548 22qq.exe 29 PID 2548 wrote to memory of 3040 2548 22qq.exe 29 PID 2548 wrote to memory of 3040 2548 22qq.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb9b368e317d4ea44000bfb64abca924.exe"C:\Users\Admin\AppData\Local\Temp\cb9b368e317d4ea44000bfb64abca924.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:2676
-
-
C:\Windows\22qq.exeC:\Windows\22qq.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:3040
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD5cb9b368e317d4ea44000bfb64abca924
SHA1d436511b9fa069d98d947312f1b12252356673b4
SHA256bbfe0fe3007141df44faec7db1a930169a0bdee1f71ed7f5b8e2e1e3c6800c0c
SHA5120d159609f35460b58aa846fba6599f5c9b268e83b59cd31ea0f48ce1a2cc2a6cd94df41f290d240de9c7bd9a9cfa1dc17e31848dfc6b421c6cb26434b47dfb43
-
Filesize
190B
MD5f35776e6b99e21f8f39f1bead0f50006
SHA1a33247c73f13bf48b78ae64a1c1ed40386db24ba
SHA2565feb647acaf069ed69e6e62dcbc2c676eaee98abe83cec60fb7841cc83d0e1dd
SHA512051f9b5957d4c716f875b6a768d49000c1033dd1340c7664438440b43ac2fd51f8ce95458c31af455171e3edf7322a009fb911f24811542ffa33e5fe4a0cb44f