Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 21:44
Static task
static1
Behavioral task
behavioral1
Sample
DrexyPerm.exe
Resource
win10v2004-20240226-en
General
-
Target
DrexyPerm.exe
-
Size
82KB
-
MD5
229c6302a564d89feb7c03bf56a24fa2
-
SHA1
3f259fe6a0749ac674e1cc1c16dd8f36d600dec9
-
SHA256
d061b00ae7fe24292aa023285dbaa0103e790e7a4b381f8fe2ea9cb39b3e8d59
-
SHA512
13bc74150181a970b2e5c234cfbb71879f36e1e91cab2e14c1201067b33ddaa9f0c0c9b5003a6ef4511b20695ff411d74e670f55cdc328c9a71253aebdd20a24
-
SSDEEP
1536:o2Y0VNblnigen1FQGpaika1PASjg/o9RF:o23rbZi/8GprF3jg/o/F
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2904 2448 DrexyPerm.exe 89 PID 2448 wrote to memory of 2904 2448 DrexyPerm.exe 89 PID 2448 wrote to memory of 2904 2448 DrexyPerm.exe 89 PID 2904 wrote to memory of 4084 2904 cmd.exe 90 PID 2904 wrote to memory of 4084 2904 cmd.exe 90 PID 2904 wrote to memory of 4084 2904 cmd.exe 90 PID 2448 wrote to memory of 3672 2448 DrexyPerm.exe 91 PID 2448 wrote to memory of 3672 2448 DrexyPerm.exe 91 PID 2448 wrote to memory of 3672 2448 DrexyPerm.exe 91 PID 2448 wrote to memory of 64 2448 DrexyPerm.exe 92 PID 2448 wrote to memory of 64 2448 DrexyPerm.exe 92 PID 2448 wrote to memory of 64 2448 DrexyPerm.exe 92 PID 2448 wrote to memory of 3004 2448 DrexyPerm.exe 93 PID 2448 wrote to memory of 3004 2448 DrexyPerm.exe 93 PID 2448 wrote to memory of 3004 2448 DrexyPerm.exe 93 PID 2448 wrote to memory of 4876 2448 DrexyPerm.exe 94 PID 2448 wrote to memory of 4876 2448 DrexyPerm.exe 94 PID 2448 wrote to memory of 4876 2448 DrexyPerm.exe 94 PID 4876 wrote to memory of 2052 4876 cmd.exe 95 PID 4876 wrote to memory of 2052 4876 cmd.exe 95 PID 4876 wrote to memory of 2052 4876 cmd.exe 95 PID 2448 wrote to memory of 1044 2448 DrexyPerm.exe 96 PID 2448 wrote to memory of 1044 2448 DrexyPerm.exe 96 PID 2448 wrote to memory of 1044 2448 DrexyPerm.exe 96 PID 2448 wrote to memory of 2328 2448 DrexyPerm.exe 97 PID 2448 wrote to memory of 2328 2448 DrexyPerm.exe 97 PID 2448 wrote to memory of 2328 2448 DrexyPerm.exe 97 PID 2448 wrote to memory of 2208 2448 DrexyPerm.exe 98 PID 2448 wrote to memory of 2208 2448 DrexyPerm.exe 98 PID 2448 wrote to memory of 2208 2448 DrexyPerm.exe 98 PID 2448 wrote to memory of 4176 2448 DrexyPerm.exe 99 PID 2448 wrote to memory of 4176 2448 DrexyPerm.exe 99 PID 2448 wrote to memory of 4176 2448 DrexyPerm.exe 99 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2052 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DrexyPerm.exe"C:\Users\Admin\AppData\Local\Temp\DrexyPerm.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Window Title2⤵PID:3672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵PID:64
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- Views/modifies file attributes
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵PID:1044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵PID:2328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵PID:2208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750