Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 10:15
Behavioral task
behavioral1
Sample
x360ce.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
x360ce.exe
Resource
win10v2004-20240508-en
General
-
Target
x360ce.exe
-
Size
14.7MB
-
MD5
be80f3348b240bcee1aa96d33fe0e768
-
SHA1
40ea5de9a7a15f6e0d891cd1ba4bca8519bb85ed
-
SHA256
74faf334cb0bdd3e9dfab8c323d4eb3b9b089bcaadc7dbd639d9aa93a4f6f829
-
SHA512
dfb3b191152981f21180e93597c7b1891da6f10b811db2c8db9f45bbecc9feb54bc032bdd648c7ad1134e9b09e5e2b9705d5e21294e1ae328a4390350745536a
-
SSDEEP
196608:n+/7/fO/vBSVnf+viDyJBwhsCArf+viDyJBQhsCAaIF/f+viDyJBaF9hsCA6EJ0k:nX/vu0Bwhs8vu0BQhsvFOvu0BaF9hsR
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
x360ce.exepid process 1264 x360ce.exe 1264 x360ce.exe 1264 x360ce.exe 1264 x360ce.exe 1264 x360ce.exe 1264 x360ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
x360ce.exedescription pid process Token: SeDebugPrivilege 1264 x360ce.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
x360ce.exepid process 1264 x360ce.exe 1264 x360ce.exe 1264 x360ce.exe 1264 x360ce.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
x360ce.exepid process 1264 x360ce.exe 1264 x360ce.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1264-0-0x000007FEF58F3000-0x000007FEF58F4000-memory.dmpFilesize
4KB
-
memory/1264-1-0x0000000000830000-0x00000000016F2000-memory.dmpFilesize
14.8MB
-
memory/1264-2-0x000000001BCD0000-0x000000001BE62000-memory.dmpFilesize
1.6MB
-
memory/1264-3-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmpFilesize
9.9MB
-
memory/1264-6-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmpFilesize
9.9MB
-
memory/1264-7-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmpFilesize
9.9MB
-
memory/1264-19-0x000000001DC70000-0x000000001DCBA000-memory.dmpFilesize
296KB
-
memory/1264-20-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmpFilesize
9.9MB