Analysis
-
max time kernel
125s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
Resource
win10v2004-20240412-en
General
-
Target
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe
-
Size
668KB
-
MD5
f5a9217e194d53e7278423686286a391
-
SHA1
fb77be3876a2dc7c3e310e9fa16e96e69915b315
-
SHA256
ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84
-
SHA512
9011e6f131318d13a2d635356d48ac768c3e2f76dda8e7148d6431ee37db4a478a6cce9a1686d69b89d1ecfb7671844b4b76f35ab8efeff6c88b3f38f27fbf3b
-
SSDEEP
12288:tMMlcxAM4ssOdatX20XEnmf2xt8srDxm/RYSWt4lGU5626XJYSuDqe0HcBoB:1ciM4sAamfa8swC3OlGC6l5e0e
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 2 2544 rundll32.exe 2 2544 rundll32.exe 2 2544 rundll32.exe 2 2544 rundll32.exe 2 2544 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2416 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe 2416 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe\"" ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\2.bat = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\~2350653744472187387\\2.bat\"" ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2416 set thread context of 2544 2416 rundll32.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeBackupPrivilege 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeRestorePrivilege 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeBackupPrivilege 2572 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeRestorePrivilege 2572 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 2572 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 2572 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: 33 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeIncBasePriorityPrivilege 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe Token: SeDebugPrivilege 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1244 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 28 PID 1988 wrote to memory of 1244 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 28 PID 1988 wrote to memory of 1244 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 28 PID 1988 wrote to memory of 1244 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 28 PID 1988 wrote to memory of 2572 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 30 PID 1988 wrote to memory of 2572 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 30 PID 1988 wrote to memory of 2572 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 30 PID 1988 wrote to memory of 2572 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 30 PID 1988 wrote to memory of 2788 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 31 PID 1988 wrote to memory of 2788 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 31 PID 1988 wrote to memory of 2788 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 31 PID 1988 wrote to memory of 2788 1988 ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe 31 PID 2788 wrote to memory of 2508 2788 cmd.exe 33 PID 2788 wrote to memory of 2508 2788 cmd.exe 33 PID 2788 wrote to memory of 2508 2788 cmd.exe 33 PID 2508 wrote to memory of 2416 2508 rundll32.exe 34 PID 2508 wrote to memory of 2416 2508 rundll32.exe 34 PID 2508 wrote to memory of 2416 2508 rundll32.exe 34 PID 2508 wrote to memory of 2416 2508 rundll32.exe 34 PID 2508 wrote to memory of 2416 2508 rundll32.exe 34 PID 2508 wrote to memory of 2416 2508 rundll32.exe 34 PID 2508 wrote to memory of 2416 2508 rundll32.exe 34 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35 PID 2416 wrote to memory of 2544 2416 rundll32.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe"C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exePECMD**pecmd-cmd* PUTF -dd -skipb=588800 -len=95855 "C:\Users\Admin\AppData\Local\Temp\~606230959033153049.tmp",,C:\Users\Admin\AppData\Local\Temp\ed8239f5324cffe38a37b09143251e89175d602b56786e422556678c41387e84.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\~2350653744472187387\2.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\system32\rundll32.exerundll32 ./1713161804.dll dllentrypoint3⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32 ./1713161804.dll dllentrypoint4⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe5⤵
- Blocklisted process makes network request
PID:2544
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD54fe3607b4c01296b113e08f46cd76a04
SHA10267353daa20fb9d30d7460bab108d0a328d56b2
SHA256247c09410d5ea2ee97500e91f0b3e57bb7290c1518084d3447c6fab8f08b235c
SHA5120d405a8d17af2d6ea465452586f59522f5681b1d19c60e03f960202fdd8293bb36e97aa47ac66b5e79104beb1815ce5179a5032f4a8e2c80edf96af050b8f751
-
Filesize
39B
MD5715da46a4cc962d88be2cafe42eedd66
SHA19771b59f518541e0d069b52df70ccfe078cbcc3a
SHA2566c782df52d05fb69739152b1de15314419416c8574abcd678d838c3d0574c735
SHA5123740475d9a78f51d1a4ae8434b69c76fc6a115a06deda2e234cdb38f3903ff10e640dd2aa75e5a996709839b7f85691d75574e77bfe57389c247cff058d06c61
-
Filesize
93KB
MD5835b66cbbd0f128745bb599c5084116f
SHA1f74e6458e1dec5a37451116ce0d2b8a3bcb72cc8
SHA256783700e78c2994420768bb735212f079b6d5eaf6f0c2b62dd028f9319f464a08
SHA512e260a98b65f76c2b25da9f1ef63770535918779c7a7f149d70682cd4057e83a5bda396dfbb73b2d74ed9002162163db764cc1ae5b0a43a4941411116edfe7f6a