Analysis
-
max time kernel
18s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
Resource
win10v2004-20240226-en
General
-
Target
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
-
Size
8.4MB
-
MD5
8a030c29b369baff7b3cdf5154af65d9
-
SHA1
9fecd83d56a1f219305a5b0a5339704175fc1193
-
SHA256
e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840
-
SHA512
afeaba25415cf9cf9e02fe1f8694959649142c9da3e04fd44978ed74288ca7044eebd901c74530291012ceb0146f360085393a4ac73bc9e70385a2aa566b28c4
-
SSDEEP
196608:+cBzO2ZgZUH+h299C1WDE0sZhd+7Y0sZhd+7Wwaujo8Sl3Gjdd6Xr7avfw1bS:+u3ZKUH+IDC1WDqZhcyZhcjo8gSd6b7H
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4728 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3592 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3768 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4728 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe 4728 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4728 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4728 e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe"C:\Users\Admin\AppData\Local\Temp\e5c0fabb1a7d5afb129ad1aa7adc60d7e9a0482f8d2b32a3f533d8d019a1e840.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4728 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C update.bat2⤵PID:4032
-
C:\Windows\SysWOW64\timeout.exeTIMEOUT /T 23⤵
- Delays execution with timeout.exe
PID:3592
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:3768
-
-
C:\Users\Admin\AppData\Local\Temp\launcher.exelauncher.exe3⤵PID:1248
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:3280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5736ce9a2f3d24d4d6b1dbf7bec1bff7f
SHA1157412c3e263bb1f721f02304878c658d2fea80b
SHA2563788e5d58ff33acad2b9f7d801b04865b4cbb274bc16d0a33a709e6744d67e9a
SHA512167497898b5e6ade2018671b8e7de52d949900d487ca6208b55de9e62cec6e02079f77cb3ff787df7f3e7adbffb1e798a8f23c2514a65e5d8e997f8e76d215f4
-
Filesize
534KB
MD5faf79c89fd07aaad1489a173e24ec9bd
SHA1bb3a1345cfc32351d3f260e631d0fab55686e499
SHA2562f52484f97a2e41d809393378e5f8f75724facf55e03e2c1e34f0d3a11abe38e
SHA512e1912116c07ce0b9520cb1833092399ddab30424ef9337cbde28c4efbebd35ee2857f5e0eb6825fcd0fc5db4ad8c59820d1cf625aa1b77729d42a17550abee0a
-
Filesize
170B
MD568626b4f1127170847ed7dea4af34b3d
SHA1a58efd288d70cd6b280cdca8bf620d31825d229d
SHA25620413fa08cadda0b8586e4e47a185372f7347088beda0e9424f1118ac36917d1
SHA512d2055b54928a1579e793578e217bf137a811b21c1fb1c22857ccf753615effadd9c3c6a0d411cbbca6400340a136809cd671bbdcbedbcd7218aa1da51dfe9989