Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 01:12
Static task
static1
Behavioral task
behavioral1
Sample
a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe
Resource
win10v2004-20240508-en
General
-
Target
a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe
-
Size
7.5MB
-
MD5
28987206ca2a073ef849b33c5cac99ac
-
SHA1
4d5f611a3c348083c10e667d1f6da6944e0b8ebc
-
SHA256
a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6
-
SHA512
eead925200a214da5ea9376871647cdc1e40dbf55c6dc7072a45f0dd69f2cb88c90b27b80798c409bf7577650078c6728b36b9a5cc892a21836a10809c558e0e
-
SSDEEP
196608:OqeQ4Uv0SgzIbfyUmvVAkCTC7ipRdQYuUhKAzqeyAUX:5R4/SxfGGkKnpRdQYsAzq2UX
Malware Config
Signatures
-
Detects executables packed with Dotfuscator 25 IoCs
resource yara_rule behavioral1/memory/2700-4-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-12-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-15-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-16-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-19-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-20-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-23-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-67-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-68-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-69-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-70-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-72-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-73-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-96-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-97-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-98-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-140-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-141-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-183-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-227-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-233-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-235-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-240-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/1964-258-0x0000000000400000-0x0000000000FA7000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator behavioral1/memory/2700-314-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Dotfuscator -
Detects executables packed with Goliath 25 IoCs
resource yara_rule behavioral1/memory/2700-4-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-12-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-15-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-16-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-19-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-20-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-23-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-67-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-68-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-69-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-70-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-72-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-73-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-96-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-97-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-98-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-140-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-141-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-183-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-227-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-233-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-235-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-240-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/1964-258-0x0000000000400000-0x0000000000FA7000-memory.dmp INDICATOR_EXE_Packed_Goliath behavioral1/memory/2700-314-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_Goliath -
Detects executables packed with SmartAssembly 25 IoCs
resource yara_rule behavioral1/memory/2700-4-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-12-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-15-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-16-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-19-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-20-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-23-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-67-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-68-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-69-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-70-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-72-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-73-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-96-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-97-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-98-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-140-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-141-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-183-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-227-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-233-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-235-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-240-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/1964-258-0x0000000000400000-0x0000000000FA7000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2700-314-0x0000000000400000-0x0000000000FC3000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1964 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe -
Loads dropped DLL 1 IoCs
pid Process 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe -
Obfuscated with Agile.Net obfuscator 27 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/2700-4-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-12-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-15-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-16-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-19-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-20-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-23-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-67-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-68-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-69-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-70-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-72-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-73-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-87-0x000000000088C000-0x0000000000F91000-memory.dmp agile_net behavioral1/memory/2700-96-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-97-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-98-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-140-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-141-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-183-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-227-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-233-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-235-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-240-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net behavioral1/memory/2700-250-0x00000000118A0000-0x0000000012447000-memory.dmp agile_net behavioral1/memory/1964-258-0x0000000000400000-0x0000000000FA7000-memory.dmp agile_net behavioral1/memory/2700-314-0x0000000000400000-0x0000000000FC3000-memory.dmp agile_net -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 1964 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2916 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 1964 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1964 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 30 PID 2700 wrote to memory of 1964 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 30 PID 2700 wrote to memory of 1964 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 30 PID 2700 wrote to memory of 1964 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 30 PID 2700 wrote to memory of 2272 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 31 PID 2700 wrote to memory of 2272 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 31 PID 2700 wrote to memory of 2272 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 31 PID 2700 wrote to memory of 2272 2700 a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe 31 PID 2272 wrote to memory of 2916 2272 cmd.exe 33 PID 2272 wrote to memory of 2916 2272 cmd.exe 33 PID 2272 wrote to memory of 2916 2272 cmd.exe 33 PID 2272 wrote to memory of 2916 2272 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe"C:\Users\Admin\AppData\Local\Temp\a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe"C:\Users\Admin\AppData\Local\Temp\a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /T 3 & del "C:\Users\Admin\AppData\Local\Temp\*.tmp"2⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\timeout.exetimeout /T 33⤵
- Delays execution with timeout.exe
PID:2916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\a6292e209366413314dd2acbbf10e75e11b6885f983843d442a0e0b5550ea6e6.exe
Filesize7.5MB
MD5e2c1592fc795e14c7a2e5ccec1febf41
SHA15c36dcbffb11d4907de6cb3bdbda4a83e56c0393
SHA256c872d8c511bc78be146ab46241ccc23e50963dbdefeec0c3040e96f6e364a404
SHA51246663436cb49daacfb3deadcdd7f2f6a64dd456d49e41d9341e812d47f9115f959abc77991d828bb836d1352f13fd647733d4d7d12a6892af7bc7b40f7fa5a00