Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe
Resource
win10v2004-20240508-en
General
-
Target
1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe
-
Size
5.5MB
-
MD5
4af2e6a8be2b1862e2e1fb834da6a927
-
SHA1
cb01022fa8b4884e17cfc26b2320d166058c5e99
-
SHA256
1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b
-
SHA512
b174b4fb021930b2515236876e1145dd585c7a40949cd6647c0cb88e6efd20382926d6bbae686f5b0b94610c4b47e40293f4452d408ee34403a8093ffecc81ce
-
SSDEEP
24576:RFVmFF1UBOW6UWaPXiWdLSvwboQyzcQWQatx50PcL+J0qTIPwPyUCZv9F8JissLs:7Dxww8uX2FjHCdl+hnCqimL47JAl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 888 Autoit3.exe -
Command and Scripting Interpreter: AutoIT 1 TTPs 1 IoCs
Using AutoIT for possible automate script.
pid Process 888 Autoit3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 888 Autoit3.exe 888 Autoit3.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1580 WMIC.exe Token: SeSecurityPrivilege 1580 WMIC.exe Token: SeTakeOwnershipPrivilege 1580 WMIC.exe Token: SeLoadDriverPrivilege 1580 WMIC.exe Token: SeSystemProfilePrivilege 1580 WMIC.exe Token: SeSystemtimePrivilege 1580 WMIC.exe Token: SeProfSingleProcessPrivilege 1580 WMIC.exe Token: SeIncBasePriorityPrivilege 1580 WMIC.exe Token: SeCreatePagefilePrivilege 1580 WMIC.exe Token: SeBackupPrivilege 1580 WMIC.exe Token: SeRestorePrivilege 1580 WMIC.exe Token: SeShutdownPrivilege 1580 WMIC.exe Token: SeDebugPrivilege 1580 WMIC.exe Token: SeSystemEnvironmentPrivilege 1580 WMIC.exe Token: SeRemoteShutdownPrivilege 1580 WMIC.exe Token: SeUndockPrivilege 1580 WMIC.exe Token: SeManageVolumePrivilege 1580 WMIC.exe Token: 33 1580 WMIC.exe Token: 34 1580 WMIC.exe Token: 35 1580 WMIC.exe Token: 36 1580 WMIC.exe Token: SeIncreaseQuotaPrivilege 1580 WMIC.exe Token: SeSecurityPrivilege 1580 WMIC.exe Token: SeTakeOwnershipPrivilege 1580 WMIC.exe Token: SeLoadDriverPrivilege 1580 WMIC.exe Token: SeSystemProfilePrivilege 1580 WMIC.exe Token: SeSystemtimePrivilege 1580 WMIC.exe Token: SeProfSingleProcessPrivilege 1580 WMIC.exe Token: SeIncBasePriorityPrivilege 1580 WMIC.exe Token: SeCreatePagefilePrivilege 1580 WMIC.exe Token: SeBackupPrivilege 1580 WMIC.exe Token: SeRestorePrivilege 1580 WMIC.exe Token: SeShutdownPrivilege 1580 WMIC.exe Token: SeDebugPrivilege 1580 WMIC.exe Token: SeSystemEnvironmentPrivilege 1580 WMIC.exe Token: SeRemoteShutdownPrivilege 1580 WMIC.exe Token: SeUndockPrivilege 1580 WMIC.exe Token: SeManageVolumePrivilege 1580 WMIC.exe Token: 33 1580 WMIC.exe Token: 34 1580 WMIC.exe Token: 35 1580 WMIC.exe Token: 36 1580 WMIC.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 212 wrote to memory of 888 212 1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe 85 PID 212 wrote to memory of 888 212 1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe 85 PID 212 wrote to memory of 888 212 1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe 85 PID 888 wrote to memory of 1376 888 Autoit3.exe 86 PID 888 wrote to memory of 1376 888 Autoit3.exe 86 PID 888 wrote to memory of 1376 888 Autoit3.exe 86 PID 1376 wrote to memory of 1580 1376 cmd.exe 88 PID 1376 wrote to memory of 1580 1376 cmd.exe 88 PID 1376 wrote to memory of 1580 1376 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe"C:\Users\Admin\AppData\Local\Temp\1d3d325b621524c2d277f8e9cd3b50869c2c29a34d1f3bba2535c82ce6eff49b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:212 -
\??\c:\st\Autoit3.exe"c:\st\Autoit3.exe" c:\st\script.a3x2⤵
- Executes dropped EXE
- Command and Scripting Interpreter: AutoIT
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\windows\SysWOW64\cmd.exe"c:\windows\system32\cmd.exe" /c wmic ComputerSystem get domain > C:\ProgramData\bdhfffd\aghhfdf3⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ComputerSystem get domain4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54B
MD5c8bbad190eaaa9755c8dfb1573984d81
SHA117ad91294403223fde66f687450545a2bad72af5
SHA2567f136265128b7175fb67024a6ddd7524586b025725a878c07d76a9d8ad3dc2ac
SHA51205f02cf90969b7b9a2de39eecdf810a1835325e7c83ffe81388c9866c6f79be6cdc8617f606a8fedc6affe6127bede4b143106a90289bbb9bf61d94c648059df
-
Filesize
128KB
MD55de419f89025ec79495d1815f331a4dc
SHA1ff1165ebd796ba40063b8a2693ac5b4f67aa28e3
SHA25649dda37ef4ff129d2cf2cfe0612bc285f8eb0150a0b1e08b7c6af03cc0a367c7
SHA5125b7f019921aaae24d7f4af1c9e846ec6362cffd61813470d5fc37f2ed1aeccebd02e24258418e1ffb32d79365db6517d30a75d0055a8584037f9f937b1c5e0fa
-
Filesize
128KB
MD5459f787d88aac14c999a80eb8ea2d38f
SHA1939996db290d4b2aba35547b738d3b486978fdf6
SHA256d9ebd880ec387e36f30d9577d2f67a7f7fbdadd02b2d3ae6cb32b071ff820cc9
SHA5121f8cb561288a388ec8f1d8d42e9d050ae201ab31b99a7cf251dff467553aec09665ebba405d07798974a47deed05170adc94708ca054257d08f1cd548311aa54