Overview
overview
10Static
static
10001.exe
windows7-x64
10001.exe
windows10-2004-x64
101488.exe
windows7-x64
101488.exe
windows10-2004-x64
101_cr.exe
windows7-x64
51_cr.exe
windows10-2004-x64
11cr.exe
windows7-x64
101cr.exe
windows10-2004-x64
101fc2d.exe
windows7-x64
101fc2d.exe
windows10-2004-x64
106e7_2021-0...04.exe
windows7-x64
106e7_2021-0...04.exe
windows10-2004-x64
10Abjects.exe
windows7-x64
1Abjects.exe
windows10-2004-x64
1BattleText.exe
windows7-x64
9BattleText.exe
windows10-2004-x64
10HANS.exe
windows7-x64
1HANS.exe
windows10-2004-x64
1Hulu.exe
windows7-x64
7Hulu.exe
windows10-2004-x64
7IntelFIVE.exe
windows7-x64
3IntelFIVE.exe
windows10-2004-x64
7IntelFOUR.exe
windows7-x64
3IntelFOUR.exe
windows10-2004-x64
7IntelONE.exe
windows7-x64
3IntelONE.exe
windows10-2004-x64
7IntelTHREE.exe
windows7-x64
3IntelTHREE.exe
windows10-2004-x64
7IntelTWO.exe
windows7-x64
3IntelTWO.exe
windows10-2004-x64
7Lucky_Fixed.exe
windows7-x64
1Lucky_Fixed.exe
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 04:03
Behavioral task
behavioral1
Sample
001.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
001.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
1488.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1488.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
1_cr.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
1_cr.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
1cr.exe
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
1cr.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
1fc2d.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
1fc2d.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
6e7_2021-01-19_18-04.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
6e7_2021-01-19_18-04.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Abjects.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Abjects.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
BattleText.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
BattleText.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
HANS.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
HANS.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Hulu.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Hulu.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
IntelFIVE.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
IntelFIVE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
IntelFOUR.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
IntelFOUR.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
IntelONE.exe
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
IntelONE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
IntelTHREE.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
IntelTHREE.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
IntelTWO.exe
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
IntelTWO.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Lucky_Fixed.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Lucky_Fixed.exe
Resource
win10v2004-20240226-en
General
-
Target
1_cr.exe
-
Size
847KB
-
MD5
af067a53dcecb2f527a351a6491c56b9
-
SHA1
845f59d0324b2577979b51a8e66689f6f604ecde
-
SHA256
9cc9a90e31f1486a991360c25209f1b08aec5bd7e084de748e73ebef6deca38d
-
SHA512
e9cc332f2108be20acbdafe91a6ee8d489eddb05b752a05d5372a468ea6c95215ca06fb0881b49fc20fac9f0d602a665272b70997df4414ea98a016f60e4fd71
-
SSDEEP
24576:TAHnh+eWsN3skA4RV1Hom2KXMmHamV55:eh+ZkldoPK8Yamt
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2448 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2448 powershell.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
1_cr.exepid process 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
1_cr.exepid process 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe 2128 1_cr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1_cr.exedescription pid process target process PID 2128 wrote to memory of 2448 2128 1_cr.exe powershell.exe PID 2128 wrote to memory of 2448 2128 1_cr.exe powershell.exe PID 2128 wrote to memory of 2448 2128 1_cr.exe powershell.exe PID 2128 wrote to memory of 2448 2128 1_cr.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1_cr.exe"C:\Users\Admin\AppData\Local\Temp\1_cr.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -executionpolicy bypass C:\Users\Admin\AppData\Local\Temp\mByZgmXsR.ps12⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-