Analysis
-
max time kernel
3s -
max time network
10s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
Resource
win10v2004-20240226-en
General
-
Target
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
-
Size
8.4MB
-
MD5
8a030c29b369baff7b3cdf5154af65d9
-
SHA1
9fecd83d56a1f219305a5b0a5339704175fc1193
-
SHA256
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840
-
SHA512
afeaba25415cf9cf9e02fe1f8694959649142c9da3e04fd44978ed74288ca7044eebd901c74530291012ceb0146f360085393a4ac73bc9e70385a2aa566b28c4
-
SSDEEP
196608:+cBzO2ZgZUH+h299C1WDE0sZhd+7Y0sZhd+7Wwaujo8Sl3Gjdd6Xr7avfw1bS:+u3ZKUH+IDC1WDqZhcyZhcjo8gSd6b7H
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2856 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe 2856 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1364 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1776 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2856 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2856 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2856 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe"C:\Users\Admin\AppData\Local\Temp\e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C update.bat2⤵PID:1436
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 23⤵
- Delays execution with timeout.exe
PID:1364
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\launcher.exelauncher.exe3⤵PID:1716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b9c085bdf9bfc1c0484464c8ff27610
SHA155db16a7152194e5c52bfc66ebeb9cf67ad820ae
SHA2567ea545485455f9c2786dc32f8ea54b1a44bf5bfbaec72057265ad55f2e6ecfeb
SHA512eb4f0b72a94722ce69f34bc8bad5a44f54600d2d08befb6219ec8baa90bc77d4b8cb5bb3d1b0f6b9faf4ad03af3ea56b74de5707485128106d0b3ac5aebc59d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2211f0be67482b8666ab701144621e3
SHA1ba65bdddfb2bd71fc3e11c8bad40280a4bfadf6f
SHA256eb0c7290d026af698d579f91a69a77aae0b1927e1de687f93ee22df733de0cc0
SHA512b3824aea14b028f7528c0b2ea7ce9257a468358ef2303249866c508f4cae07e92edb45cab31c51d896d1e7f74aa483affa9b7f2ba8d748e2db5a794879bb7f4a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
923KB
MD59a780ba838731db60a9baffe2cfaa910
SHA1cef4101cef711b7506dfd6201d747dbd20dc7e35
SHA256d17676982dfdacc8802b6139952168a934c714748568cf2c3095ee4e1b235bb0
SHA51251691e0a919fc4581eead477d6f59075cada58cc80814074fd17f967fca85f85a4ac6ed630a5dc67d77a3e1f260ea6bb6e6c54ae2c65a7f67ac6998a8abf58f8
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
448KB
MD589a955a7f946d3fcbed0109da3359ddf
SHA1eeb014c7f058016cdbd6dfe8fff0c1c9cb1fa9c3
SHA2560e6a868069d6ce2718b2a734ed5eb45c4a2ba003078e7dc25549587cb50856a8
SHA512efd574f9517835a4937a1862a15306fe697c741944ffad7be790fe7f69aaf24ac9a334ca9c92459f2bbb2146a6e254d76b2aa7d0e9582eb280b76eb5dce56240
-
Filesize
170B
MD568626b4f1127170847ed7dea4af34b3d
SHA1a58efd288d70cd6b280cdca8bf620d31825d229d
SHA25620413fa08cadda0b8586e4e47a185372f7347088beda0e9424f1118ac36917d1
SHA512d2055b54928a1579e793578e217bf137a811b21c1fb1c22857ccf753615effadd9c3c6a0d411cbbca6400340a136809cd671bbdcbedbcd7218aa1da51dfe9989