Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
12-06-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win11-20240419-en
General
-
Target
loader.exe
-
Size
5.3MB
-
MD5
e630d72436e3dc1be7763de7f75b7adf
-
SHA1
40e07b22ab8b69e6827f90e20aeac35757899a23
-
SHA256
59818142f41895d3cadf7bee0124b392af3473060f00b9548daa3a224223993e
-
SHA512
82f0be15e2736447fae7d9a313a8a81a2c6e6ca617539ff8bf3fa0d2fe93d96e68afea6964e96e9dd671ba4090ddbc8a759c9b68f10e24a7fb847fe2c9825a83
-
SSDEEP
98304:MY5XZjNqBeNp4iSgPKpQ9CKhqkaIWvO9SYCxBKXyaxVdb+tSVGHyYDMMl7qg7:MYpMeNp4irCmWISnTz2VtIVDMg7n7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3880 loader.exe -
Loads dropped DLL 9 IoCs
pid Process 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe 3880 loader.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3880 loader.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3880 3140 loader.exe 77 PID 3140 wrote to memory of 3880 3140 loader.exe 77 PID 3880 wrote to memory of 2080 3880 loader.exe 78 PID 3880 wrote to memory of 2080 3880 loader.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\onefile_3140_133626614573626400\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "start maple.exe"3⤵PID:2080
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD56a9ca97c039d9bbb7abf40b53c851198
SHA101bcbd134a76ccd4f3badb5f4056abedcff60734
SHA256e662d2b35bb48c5f3432bde79c0d20313238af800968ba0faa6ea7e7e5ef4535
SHA512dedf7f98afc0a94a248f12e4c4ca01b412da45b926da3f9c4cbc1d2cbb98c8899f43f5884b1bf1f0b941edaeef65612ea17438e67745962ff13761300910960d
-
Filesize
76KB
MD58140bdc5803a4893509f0e39b67158ce
SHA1653cc1c82ba6240b0186623724aec3287e9bc232
SHA25639715ef8d043354f0ab15f62878530a38518fb6192bc48da6a098498e8d35769
SHA512d0878fee92e555b15e9f01ce39cfdc3d6122b41ce00ec3a4a7f0f661619f83ec520dca41e35a1e15650fb34ad238974fe8019577c42ca460dde76e3891b0e826
-
Filesize
76KB
MD5ebefbc98d468560b222f2d2d30ebb95c
SHA1ee267e3a6e5bed1a15055451efcccac327d2bc43
SHA25667c17558b635d6027ddbb781ea4e79fc0618bbec7485bd6d84b0ebcd9ef6a478
SHA512ab9f949adfe9475b0ba8c37fa14b0705923f79c8a10b81446abc448ad38d5d55516f729b570d641926610c99df834223567c1efde166e6a0f805c9e2a35556e3
-
Filesize
28KB
MD597ee623f1217a7b4b7de5769b7b665d6
SHA195b918f3f4c057fb9c878c8cc5e502c0bd9e54c0
SHA2560046eb32f873cde62cf29af02687b1dd43154e9fd10e0aa3d8353d3debb38790
SHA51220edc7eae5c0709af5c792f04a8a633d416da5a38fc69bd0409afe40b7fb1afa526de6fe25d8543ece9ea44fd6baa04a9d316ac71212ae9638bdef768e661e0f
-
Filesize
34KB
MD532d36d2b0719db2b739af803c5e1c2f5
SHA1023c4f1159a2a05420f68daf939b9ac2b04ab082
SHA256128a583e821e52b595eb4b3dda17697d3ca456ee72945f7ecce48ededad0e93c
SHA512a0a68cfc2f96cb1afd29db185c940e9838b6d097d2591b0a2e66830dd500e8b9538d170125a00ee8c22b8251181b73518b73de94beeedd421d3e888564a111c1
-
Filesize
8.5MB
MD57e528c7d750373f489ed3983d28a5279
SHA1805d666d7c3f98b0f2f21f8ded1ebc801bb87028
SHA2567b025b56f3cec113e0569dfa37fa593f64d15c42116d321452500c03df105b8e
SHA51240b4809678c6b17fcd389038464d32752058e60ed446d941698fee561641e740652bd305e2a6fe80cdd6171807fe6fbc22b99e4eaccd4c699acaca39b7328ca3
-
Filesize
64KB
MD534e49bb1dfddf6037f0001d9aefe7d61
SHA1a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA2564055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2