Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe
Resource
win10v2004-20240508-en
General
-
Target
8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe
-
Size
18KB
-
MD5
9b28f0a393a2b5879a54e0f83987deb0
-
SHA1
8a3b0583fd92fbbb85e85ebc4018ad693e9df26f
-
SHA256
8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be
-
SHA512
9bf94e44e33f6714146aced24b8505ca801499b9ba62f00a46a309d32f22330f45fa522e7d1840bf8b8f984937e86cfd6e9faf09323f8cc85061ec4a003c9d10
-
SSDEEP
384:r6eHIAx0pqNgHvRtoyhAkeKE7pDKbR6hcdBYpBmLE:r6eHIMgPRtzykeKE7pkRpTE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2672 trys.exe -
Loads dropped DLL 5 IoCs
pid Process 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ineter Mc = "C:\\Users\\Admin\\AppData\\Roaming\\trys.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe Token: SeDebugPrivilege 2672 trys.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 2672 trys.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2284 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 28 PID 2208 wrote to memory of 2284 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 28 PID 2208 wrote to memory of 2284 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 28 PID 2208 wrote to memory of 2284 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 28 PID 2284 wrote to memory of 2676 2284 cmd.exe 30 PID 2284 wrote to memory of 2676 2284 cmd.exe 30 PID 2284 wrote to memory of 2676 2284 cmd.exe 30 PID 2284 wrote to memory of 2676 2284 cmd.exe 30 PID 2208 wrote to memory of 2672 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 31 PID 2208 wrote to memory of 2672 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 31 PID 2208 wrote to memory of 2672 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 31 PID 2208 wrote to memory of 2672 2208 8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe"C:\Users\Admin\AppData\Local\Temp\8212b521d5f17a1dec98c2bbbc4269c1c8993259d174095956a1e49e4ac071be.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AYMNI.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Ineter Mc" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\trys.exe" /f3⤵
- Adds Run key to start application
PID:2676
-
-
-
C:\Users\Admin\AppData\Roaming\trys.exe"C:\Users\Admin\AppData\Roaming\trys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD56dbb2090ff90500da05a027765cde190
SHA1425b833d9d1df8d6df6e5a59f738058808271949
SHA25671ca0761f7187f2164f62b23d5d9d2dcfd28d9ab9a8dfc14796c3ac06db03881
SHA5127e4679e04bd5a69c026949a0d2760a630bc02249a04f3bd224dee41d1bf10f0a29e45812a67c583327a63e5401f0ff2aa9a3f4df8233b150943052c97e861ab3
-
Filesize
18KB
MD5700245132c87eb8fdef473adea695dbb
SHA182c6a1470834985cbca127cdc290f7d7556ab941
SHA256e4e64ad7a786faa5109358e0661cb6dfc6467bb748ff400e61e9ced3515df6f1
SHA5128963d600c517848b9f64055a6cb91b4318693e30dd6b59ca40244696e2e30bc49e12340d6637873641573e6f575b5159f1178dbd23b5d9b4d64bdc8837d7abb2