Analysis
-
max time kernel
112s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 08:10
Behavioral task
behavioral1
Sample
6dd1a8690094ba35b15996cb5f9b1f60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6dd1a8690094ba35b15996cb5f9b1f60N.exe
Resource
win10v2004-20240709-en
General
-
Target
6dd1a8690094ba35b15996cb5f9b1f60N.exe
-
Size
31KB
-
MD5
6dd1a8690094ba35b15996cb5f9b1f60
-
SHA1
fc333783b4c84333782a91239fbf3d5e35f1e659
-
SHA256
63d6dc01f783a52120c9988aeca0f6203335d7c47c1a62c3150a8b58cac1e105
-
SHA512
5c5068574224f8a743582cca855512f45a2efcbe4c3c54174147859384841137f5c66b18969e7c6ad0d59a9b4c77b85896365b4107a20f312654030889c3add8
-
SSDEEP
768:4noSEjp9Plchfr6TUqnbcuyD7UYK4pavvvZeee26666HEEExTtqqqqL6:4oSEZWTUUqnouy8YXEvvvZeee50
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2064 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1920 sgchost.exe -
resource yara_rule behavioral1/memory/2368-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x000700000001211b-3.dat upx behavioral1/memory/2368-4-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1920-5-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1920-11-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/1920-14-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\sgchost.exe 6dd1a8690094ba35b15996cb5f9b1f60N.exe File opened for modification C:\Windows\Debug\sgchost.exe 6dd1a8690094ba35b15996cb5f9b1f60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 sgchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz sgchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2368 6dd1a8690094ba35b15996cb5f9b1f60N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2064 2368 6dd1a8690094ba35b15996cb5f9b1f60N.exe 30 PID 2368 wrote to memory of 2064 2368 6dd1a8690094ba35b15996cb5f9b1f60N.exe 30 PID 2368 wrote to memory of 2064 2368 6dd1a8690094ba35b15996cb5f9b1f60N.exe 30 PID 2368 wrote to memory of 2064 2368 6dd1a8690094ba35b15996cb5f9b1f60N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dd1a8690094ba35b15996cb5f9b1f60N.exe"C:\Users\Admin\AppData\Local\Temp\6dd1a8690094ba35b15996cb5f9b1f60N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6DD1A8~1.EXE > nul2⤵
- Deletes itself
PID:2064
-
-
C:\Windows\Debug\sgchost.exeC:\Windows\Debug\sgchost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5909b0af87e672fdb455c505ef8ac21e6
SHA1009d7198bd161c3b83946faf03118fbc7d86e337
SHA25639953c7561de404bf8dcb6c7e694fc0e9c800e120df076bcf5ee968fa94a3635
SHA5126791bbd02b082cec786d089e1b3e39769de1f8790acef60021ca60459a12793b4ef5979d3c770c18683bb47b600f693d5ca780b5b0cf144e5ea952bdfb6e4565