Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 02:13

General

  • Target

    1d90e08c3cb393e96f6b1ec761861179.exe

  • Size

    742KB

  • MD5

    1d90e08c3cb393e96f6b1ec761861179

  • SHA1

    79a7b09ee3f6d2c222121dbb2ce9ea3ad75d941a

  • SHA256

    d84d64047fac75797fbf05eaa2e7a2d22f36da5d9fbc0b21e29c4934571df08f

  • SHA512

    fc515a1126ceaacfb93ae76668b938881b1300c107972c86c1adf4bca999fff1ca930e1d899c25c369788bc0377161764bfdc66bfe8ea17e1989567529c7ac84

  • SSDEEP

    12288:kY7klCRLlERbxFS3XKZPqBuRhZsjuqoHmchNeITSNfE1cPBFj1pbYKDs:N7klCRLlERbx7PuuPZsjfoHxhNeO5IBs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d90e08c3cb393e96f6b1ec761861179.exe
    "C:\Users\Admin\AppData\Local\Temp\1d90e08c3cb393e96f6b1ec761861179.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2032
  • C:\pRogram Files\bbsnerm.exe
    "C:\pRogram Files\bbsnerm.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\bbsnerm.exe

    Filesize

    742KB

    MD5

    1d90e08c3cb393e96f6b1ec761861179

    SHA1

    79a7b09ee3f6d2c222121dbb2ce9ea3ad75d941a

    SHA256

    d84d64047fac75797fbf05eaa2e7a2d22f36da5d9fbc0b21e29c4934571df08f

    SHA512

    fc515a1126ceaacfb93ae76668b938881b1300c107972c86c1adf4bca999fff1ca930e1d899c25c369788bc0377161764bfdc66bfe8ea17e1989567529c7ac84

  • memory/2032-0-0x0000000000400000-0x00000000004C3058-memory.dmp

    Filesize

    780KB

  • memory/2032-1-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2032-7-0x0000000000400000-0x00000000004C3058-memory.dmp

    Filesize

    780KB

  • memory/3056-5-0x0000000000400000-0x00000000004C3058-memory.dmp

    Filesize

    780KB

  • memory/3056-6-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/3056-8-0x0000000000400000-0x00000000004C3058-memory.dmp

    Filesize

    780KB

  • memory/3056-10-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB