Overview
overview
10Static
static
10133359336e...96.exe
windows10-2004-x64
7system.pyc
windows10-2004-x64
315b2fa0131...aa.zip
windows10-2004-x64
1IMHttpComm.dll
windows10-2004-x64
3ImLookExU.dll
windows10-2004-x64
1ImLookU.dll
windows10-2004-x64
3ImNtUtilU.dll
windows10-2004-x64
3ImPackr.exe
windows10-2004-x64
7ImUtilsU.dll
windows10-2004-x64
3ImWrappU.dll
windows10-2004-x64
1Microsoft....nifest
windows10-2004-x64
3Microsoft....nifest
windows10-2004-x64
3SftTree_IX86_U_60.dll
windows10-2004-x64
1chamiso.sql
windows10-2004-x64
3mfc80u.dll
windows10-2004-x64
1msvcp80.dll
windows10-2004-x64
1msvcr80.dll
windows10-2004-x64
1torpor.zip
windows10-2004-x64
1wlessfp1.dll
windows10-2004-x64
31dcf0f609f...f9.exe
windows10-2004-x64
5b76a896c8f...f7.exe
windows10-2004-x64
1Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 08:29
Behavioral task
behavioral1
Sample
133359336ed60b94e9cd500fb518a72fe8711c4a8f8fc83ef2cc242173d8cb96.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
system.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
15b2fa0131427a7fbffe42ce83f36357661772faa0381e6ab8ef21a81c6380aa.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
IMHttpComm.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
ImLookExU.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral6
Sample
ImLookU.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
ImNtUtilU.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral8
Sample
ImPackr.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
ImUtilsU.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral10
Sample
ImWrappU.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
Microsoft.VC80.CRT.manifest
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
Microsoft.VC80.MFC.manifest
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
SftTree_IX86_U_60.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral14
Sample
chamiso.sql
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
mfc80u.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
msvcp80.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
msvcr80.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
torpor.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
wlessfp1.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
b76a896c8faf8ca28e4f0ecce91e7a622c3ea8999f27503ac9f46e09542c26f7.exe
Resource
win10v2004-20240508-en
General
-
Target
1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe
-
Size
4.2MB
-
MD5
df8bc20d6d4c7e66a8d0b2fb75e2cb99
-
SHA1
5b0a5995d233907e802ce289c5433e7b416969a7
-
SHA256
1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9
-
SHA512
7d6ac3b5afb3babc0ff8d807a0c4f6b2c314e841b30b1f8fb734b573f001c7c41a19fe69c8457ba9f35a5ead78de11e65d9a59d3142cc41d1c3ba91d7917b00a
-
SSDEEP
49152:RVfDv2Ukn4dghWFiOPGgHGZZSLO3THkCouaUq8c3Fn7t62TpBPuVlVYZwDqMLUs9:RVfDv1kn8gvid9t6O/4lW6XLUszv0AZ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exedescription pid process target process PID 3196 set thread context of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
MSBuild.exepid process 2004 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe Token: SeDebugPrivilege 2004 MSBuild.exe Token: SeBackupPrivilege 2004 MSBuild.exe Token: SeSecurityPrivilege 2004 MSBuild.exe Token: SeSecurityPrivilege 2004 MSBuild.exe Token: SeSecurityPrivilege 2004 MSBuild.exe Token: SeSecurityPrivilege 2004 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exedescription pid process target process PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe PID 3196 wrote to memory of 2004 3196 1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe"C:\Users\Admin\AppData\Local\Temp\1dcf0f609f8e6867fe4a7b49c97d5674fefe7a64fdb82de1fd819a3b96a8d8f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2004