Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 10:08
Behavioral task
behavioral1
Sample
a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe
Resource
win10v2004-20240226-en
General
-
Target
a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe
-
Size
877KB
-
MD5
0678b88b20f503b254bb149ab0caaaa9
-
SHA1
2a30d79cbdb7ad3f28748bd02442f2dc42f36ae1
-
SHA256
a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a
-
SHA512
343dc4d0b291fc2ac5ae43c649b16553f96e45f12f686d54819ef58cdceef688b53c2e43fec311fcc989f1be96c8b7de9a088b9da3e433c278800d81603bc385
-
SSDEEP
24576:O46141j2Y7Ie3/RoEka+IqwV8RtdGTWw0NPX:IYs8+Eka+V42d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4548 ~~4455873870274564963.tmp.exe -
resource yara_rule behavioral2/memory/2228-0-0x0000000000400000-0x0000000000563000-memory.dmp upx behavioral2/memory/2688-1-0x0000000000400000-0x0000000000563000-memory.dmp upx behavioral2/memory/2688-3-0x0000000000400000-0x0000000000563000-memory.dmp upx behavioral2/memory/4596-20-0x0000000000400000-0x0000000000563000-memory.dmp upx behavioral2/memory/2228-19-0x0000000000400000-0x0000000000563000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeBackupPrivilege 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeRestorePrivilege 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: 33 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeIncBasePriorityPrivilege 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: 33 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeIncBasePriorityPrivilege 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeBackupPrivilege 2688 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeRestorePrivilege 2688 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: 33 2688 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeIncBasePriorityPrivilege 2688 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: 33 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeIncBasePriorityPrivilege 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: 33 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeIncBasePriorityPrivilege 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeBackupPrivilege 4596 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeRestorePrivilege 4596 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: 33 4596 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe Token: SeIncBasePriorityPrivilege 4596 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2688 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 87 PID 2228 wrote to memory of 2688 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 87 PID 2228 wrote to memory of 2688 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 87 PID 2228 wrote to memory of 4548 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 88 PID 2228 wrote to memory of 4548 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 88 PID 2228 wrote to memory of 4596 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 91 PID 2228 wrote to memory of 4596 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 91 PID 2228 wrote to memory of 4596 2228 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 91 PID 4596 wrote to memory of 1404 4596 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 92 PID 4596 wrote to memory of 1404 4596 a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe"C:\Users\Admin\AppData\Local\Temp\a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exePECMD**pecmd-cmd* PUTF "C:\Users\Admin\AppData\Local\Temp\~~4455873870274564963.tmp.exe",,"C:\Users\Admin\AppData\Local\Temp\a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exe""#102|SCRIPT"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\~~4455873870274564963.tmp.exe"C:\Users\Admin\AppData\Local\Temp\~~4455873870274564963.tmp.exe"2⤵
- Executes dropped EXE
PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\a7adc3e8d6abd3137e589c2b9b90c7906bd151927cae60a09f9c30adfed33c1a.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~1080226240683966369.cmd"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\SYSTEM32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~1080226240683966369.cmd"3⤵PID:1404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404B
MD5beb533534ec4bd117a846c3711a69631
SHA1b8cdb63c7f87e93d76bca0542b8661852b1e1f10
SHA25664a832015133088fb6eba81bb3e9b54c1e1ec55c9e3291fc3df582edcda20d16
SHA512c76fe328f02991a676141ae02ef68eeb0d745754985370f4a93997c32e05569a9fd260c6b393fbd325506ffdf63a7e68ac6336f8c60511da86d8ae40c5029599
-
Filesize
1.2MB
MD591ae85b988567f4aaff7621167982ce8
SHA10e8b52585e5f3defeb09c3b5488efa8924935e36
SHA2565bdfd84246684c737313a541352ee52bf94f0a64a8977c25cc38500f65c57c94
SHA512410fc9aa80d673961e4430b930bba646224259883b7f3cbc4c6907692463fd3ed5e19583a4de7cd050b1e6dfe560ddd10c65f726bad51a736e23819bffb5d602