Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2024, 08:36

General

  • Target

    debc8ecc41377405e178dd8d3ad95500.exe

  • Size

    47KB

  • MD5

    debc8ecc41377405e178dd8d3ad95500

  • SHA1

    74e0dd61d858ec1a710263f64faa99a459f48702

  • SHA256

    ae1010e51f7e7838d20f1d3ff6ef8e883e71ade7be86603e842aabe219c3b9df

  • SHA512

    6cf365f9ba9ca3d02594fc7270c3ffc96980c7c0bbc1274bae3e1717c712f9fa0dbf06511c2325a0a3bb1e5037f785a19b2a71ddf3ae9a54fbe7c78c6bf1067b

  • SSDEEP

    768:7NdFUnASASKRloop4p1amBLT0XLMEIfWf4PL7cOaJ/wK3bNGSxPENl8zfpn:5dmAHLLp4pZALBGc4Pe4exPC

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\debc8ecc41377405e178dd8d3ad95500.exe
    "C:\Users\Admin\AppData\Local\Temp\debc8ecc41377405e178dd8d3ad95500.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2224
    • \??\c:\users\admin\appdata\local\temp\debc8ecc41377405e178dd8d3ad95500.exe
      c:\users\admin\appdata\local\temp\debc8ecc41377405e178dd8d3ad95500.exe
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
        • Sets service image path in registry
        PID:2272

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\windows\SysWOW64\mssrv32.exe

          Filesize

          47KB

          MD5

          debc8ecc41377405e178dd8d3ad95500

          SHA1

          74e0dd61d858ec1a710263f64faa99a459f48702

          SHA256

          ae1010e51f7e7838d20f1d3ff6ef8e883e71ade7be86603e842aabe219c3b9df

          SHA512

          6cf365f9ba9ca3d02594fc7270c3ffc96980c7c0bbc1274bae3e1717c712f9fa0dbf06511c2325a0a3bb1e5037f785a19b2a71ddf3ae9a54fbe7c78c6bf1067b

        • memory/2224-0-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2224-1-0x00000000003C0000-0x00000000003C2000-memory.dmp

          Filesize

          8KB

        • memory/2224-2-0x0000000015110000-0x0000000015119000-memory.dmp

          Filesize

          36KB

        • memory/2224-3-0x0000000015110000-0x0000000015119000-memory.dmp

          Filesize

          36KB

        • memory/2224-14-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2224-15-0x0000000015110000-0x0000000015119000-memory.dmp

          Filesize

          36KB

        • memory/2272-13-0x0000000015110000-0x0000000015119000-memory.dmp

          Filesize

          36KB

        • memory/2272-17-0x0000000015110000-0x0000000015119000-memory.dmp

          Filesize

          36KB

        • memory/2364-5-0x0000000000400000-0x000000000041E000-memory.dmp

          Filesize

          120KB

        • memory/2364-7-0x0000000015110000-0x0000000015119000-memory.dmp

          Filesize

          36KB