Analysis
-
max time kernel
168s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe
Resource
win10v2004-20240412-en
General
-
Target
d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe
-
Size
705KB
-
MD5
e0de11e16d2fc5685ec2bbfdb93c3dbf
-
SHA1
3afb423147b6bb9e3043c92fa7bfd3e31af1947c
-
SHA256
d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270
-
SHA512
27c6f526e22ae49b0c8cbd6eb55b5d52e9ff41e98bc3b98fa3d22ce2b2bdd93c12ecddf8a57a9f16cf55ad5716bdd44462d6d7e61eeabe54fcf3536c9ff35abd
-
SSDEEP
12288:EW9B+VKYlhw0tgZNPNUl5KRgT3h2VR/9fyBoYJ6YNuwnReNEHFvlJsAStmhskK:EW9BsntGDjVNpyeYJ6YUwnRfWgK
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 464 Process not Found 2576 alg.exe 1728 aspnet_state.exe 1684 mscorsvw.exe 3064 mscorsvw.exe -
Loads dropped DLL 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\c0a266ef9b392089.bin alg.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2788 d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe"C:\Users\Admin\AppData\Local\Temp\d484f0c77d2b8f4b37781b075d763d7fdd72d98cabbd654e3731c41eb335d270.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2576
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:1728
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1684
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3064
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
648KB
MD521769e9c18ed005ec6ba44b513a0e621
SHA1068fd45b17c83dff308a08f7c4291c1e82091de1
SHA256a54dba49d2fef8b979e234e3ae51999393085df3c818109608883fe43c93c9b4
SHA5129c70f9ed8c7968bfe9f49d23b816ec33d9fee287c4d66e7f38d54403e9dddae7b813af30f32d075fe2f3c7ea1438dead81cf90887498ad83e41134e7ef5b33dd
-
Filesize
625KB
MD57438f8fbe7da655f3c53ebedf489996e
SHA1ef55f9571edab47adacdc6a4b6e9a475a73cca4d
SHA2569233e7e993e163c2ba0b485eae49994e1b30f6fa3749649c0604148fe72b2b58
SHA512e6638a819334831cceaa4192734e55f84bc0f19a6db1b9bc4dce2b347f1bfe590103339dd978109e5f46251d383981b2a4cade779c5afdd09296e9fca6ff8e38
-
Filesize
644KB
MD54180ed5857adbf9619a6ab65091ef69a
SHA19a0158983299d6724bceed2813f5818b1bee36ed
SHA25654b606860c44809ce349d09d1868957f145ea10fc767e7daa3e8b28acb2de6f9
SHA51269f716216d8d174dbc832378f332d29fdc9863c68887659be1b54b0064fcc2bfe21c8053f3eae5d752fa2c8db45513ce4d91245ea702b6a073b8f6c0b2d492ce
-
Filesize
603KB
MD5a1025eafcba5cedb00ebf8ecb680a2fc
SHA1116351561ab51fc209914d630d32c7d0db8cbb0c
SHA256db77c57d34dbb16af89d60d56b3dae8281304b7636e67f73d252573374d4a4fc
SHA5121118acfb2e143dccd7a8af25d456761088253649883651a423014c175e1d3d6532f00826d9c5f2fbc32fb7ba1ca2152ecf8fe8be4463826a3f386268b2460986