Analysis
-
max time kernel
51s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 13:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ddv.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ddv.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
ddv.exe
-
Size
853KB
-
MD5
c581187d51ca3b1f7ccf3b7e4ca5c7fb
-
SHA1
a6ab6616689a0030fd7cbee89e380a8bb9a9a146
-
SHA256
f431ef3e225cccee2e5a0c14a5421b636e2371fd5d86869f795f73bcfe200a79
-
SHA512
8357ef5bb070a762de3211f73aebb72140f90b522383b26c8d491cdcf594f05214430ace1a884dd6f599b87bc0754ce0cdfb51b4b505e872bc405f65cf36d345
-
SSDEEP
12288:brtfG+RxIf3Yu0Cp5WerP+52B4gdEiz3j4cgKwL6Ix7fsL9X4DS+2GN+mCxW5:HtOV/R0ervqXD+bxA
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
description pid Process Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe Token: 33 1428 mmc.exe Token: SeIncBasePriorityPrivilege 1428 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1428 mmc.exe 1428 mmc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2728 1428 mmc.exe 31 PID 1428 wrote to memory of 2728 1428 mmc.exe 31 PID 1428 wrote to memory of 2728 1428 mmc.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddv.exe"C:\Users\Admin\AppData\Local\Temp\ddv.exe"1⤵PID:2392
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 11362⤵PID:2728
-