Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe
Resource
win7-20240221-en
General
-
Target
e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe
-
Size
1.3MB
-
MD5
c2502c61c5afbe6dddae23eb0a33c87e
-
SHA1
86d7f370230fac9f3a7878b7d213b5d61e73c0d9
-
SHA256
e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204
-
SHA512
9ace6006d142e3b55ebfcf72ee07347a67e2cc09f3c6ecd664419affc4fd9ce920f989989d7f1c2a985b3dabc6121291cb8b8bc6684dc38ac5e384ddef622210
-
SSDEEP
24576:V2zEYytjjqNSlhvpfQiIhKPtehfQ7r9qySkbgedtaHsK+fM2jEaNZBqoeW7V6tGX:VPtjtQiIhUyQd1SkFdtksDM2jh3BqS7z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 464 Process not Found 2720 alg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\Adobe PCD\pcd.db e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\caps\hdpim.db-journal e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2600 e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe"C:\Users\Admin\AppData\Local\Temp\e3b43865ab465a68fcc02dc5ec0e04eeacf29ea3ea8d932b67e06823f0b07204.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD584abaf22d0690822a925bc66d6b160af
SHA156f3e2770dc9bbfedb3650db458d1528b4b5fd58
SHA2568a687816a8acf3d1b62058fc09296be4e04b0db9a13ade990ce33f0a7f798b5f
SHA512ed41f55cb98698c6ddb33c28255df8a78fd19f5284ed47bf59f1cabdb4588a729d32edca25e34f3443e02f4b98ce476f593d9ff447e385cb70fd9fe74a136c91