Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe
Resource
win10v2004-20240704-en
General
-
Target
408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe
-
Size
773KB
-
MD5
770164e260bc79cc9fc1a46d7048b6c8
-
SHA1
337af864360d177842bac09c5a69e7fad7152b8e
-
SHA256
408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705
-
SHA512
277ddd0c2154c848816caefe44682c68ab318423775793657568aac299055bc78880b9f2f73a950a5753a9aa7f48f08e40b07032c76ca215a0da2524abd0b926
-
SSDEEP
12288:EY5Qvy6uSajv6QAcFahZxB6PzNm0E7UHPkGdDTVVZ+ApgoQ:75QvTuSar6QgezNm0EG8ixOd
Malware Config
Signatures
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file1.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file1.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file1.lnk 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe -
Executes dropped EXE 1 IoCs
pid Process 4048 file1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2672 PING.EXE 4932 PING.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 4048 file1.exe 4048 file1.exe 4048 file1.exe 4048 file1.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe Token: SeDebugPrivilege 4048 file1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 956 wrote to memory of 3860 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 88 PID 956 wrote to memory of 3860 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 88 PID 956 wrote to memory of 3860 956 408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe 88 PID 3860 wrote to memory of 2672 3860 cmd.exe 90 PID 3860 wrote to memory of 2672 3860 cmd.exe 90 PID 3860 wrote to memory of 2672 3860 cmd.exe 90 PID 3860 wrote to memory of 4932 3860 cmd.exe 91 PID 3860 wrote to memory of 4932 3860 cmd.exe 91 PID 3860 wrote to memory of 4932 3860 cmd.exe 91 PID 3860 wrote to memory of 4048 3860 cmd.exe 92 PID 3860 wrote to memory of 4048 3860 cmd.exe 92 PID 3860 wrote to memory of 4048 3860 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe"C:\Users\Admin\AppData\Local\Temp\408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 43 > nul && copy "C:\Users\Admin\AppData\Local\Temp\408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file1.exe" && ping 127.0.0.1 -n 43 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file1.exe"2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 433⤵
- Runs ping.exe
PID:2672
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 433⤵
- Runs ping.exe
PID:4932
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file1.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file1.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
773KB
MD5770164e260bc79cc9fc1a46d7048b6c8
SHA1337af864360d177842bac09c5a69e7fad7152b8e
SHA256408ebb410556ff1cafbffc9b6ef76f8bdb215156b90e52a07711ea17573bc705
SHA512277ddd0c2154c848816caefe44682c68ab318423775793657568aac299055bc78880b9f2f73a950a5753a9aa7f48f08e40b07032c76ca215a0da2524abd0b926