Overview
overview
10Static
static
10096bb2bde6...8f.exe
windows10-2004-x64
102decc47201...a2.exe
windows10-2004-x64
1044f28cd6ea...7e.exe
windows10-2004-x64
182ad518318...3a.exe
windows10-2004-x64
992c50cd253...b9.exe
windows10-2004-x64
6a58b5f2e81...39.exe
windows10-2004-x64
10c531015ec0...86.exe
windows10-2004-x64
8ca8b0ebbb3...0e.exe
windows10-2004-x64
9d8fd9ad2f3...3b.exe
windows10-2004-x64
10f241f35bb0...e5.exe
windows10-2004-x64
7$APPDATA/c...56.dll
windows10-2004-x64
1$APPDATA/c...om.dll
windows10-2004-x64
1$APPDATA/c...er.dll
windows10-2004-x64
1$APPDATA/c...or.dll
windows10-2004-x64
1$APPDATA/c...es.dll
windows10-2004-x64
1$APPDATA/c...ib.dll
windows10-2004-x64
1$APPDATA/cl/_ssl.dll
windows10-2004-x64
1$APPDATA/cl/bz2.dll
windows10-2004-x64
1$APPDATA/cl/cl.exe
windows10-2004-x64
1$APPDATA/cl/mklnk.cmd
windows10-2004-x64
3$APPDATA/c...at.dll
windows10-2004-x64
1$APPDATA/c...27.dll
windows10-2004-x64
3$APPDATA/c...27.dll
windows10-2004-x64
3$APPDATA/c...ve.cmd
windows10-2004-x64
1$APPDATA/c...ct.dll
windows10-2004-x64
1$APPDATA/cl/ui.exe
windows10-2004-x64
3$APPDATA/c...ta.dll
windows10-2004-x64
1$APPDATA/c...pi.dll
windows10-2004-x64
1$APPDATA/c...dh.dll
windows10-2004-x64
1$APPDATA/c...pe.dll
windows10-2004-x64
1$APPDATA/c...et.dll
windows10-2004-x64
1$PLUGINSDIR/INetC.dll
windows10-2004-x64
3Analysis
-
max time kernel
547s -
max time network
459s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 15:28
Behavioral task
behavioral1
Sample
096bb2bde62238273995a3a4446818a4b6b7df00fadb7ea3d068d88ca8e2798f.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
2decc47201a1d43aeec5853c4c89b7273bfdd782fcc52106a3675944739998a2.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
82ad5183183a5fa7d9f2324c67b21bb7c97ed1dd46cfb7b63494a6b94f8b893a.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
92c50cd253de42823a2e1a59f2551aa315ceb12b8f741820bdbc14b5ebe1dfb9.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral6
Sample
a58b5f2e8172be31e3d1fcc046d044bd862393f3d3e12922287bedf6f8c18e39.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
c531015ec09adf346131a375df9b9d04c90657fac9b80f2b1e269dae6186de86.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral8
Sample
ca8b0ebbb30f371219c2ae79cdc0bd1dd3114cdf27821e71cfbcc11f9daca30e.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
d8fd9ad2f30cade8bf0c36f5a3acc64ccc95f625b9f3e2c0654046a531b4e83b.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral10
Sample
f241f35bb0f53a1baf0e5da26ef7bb86f3de83e94f3ccab04086b26f2f95dde5.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$APPDATA/cl/Crypto.Hash._SHA256.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral12
Sample
$APPDATA/cl/Crypto.Random.OSRNG.winrandom.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
$APPDATA/cl/Crypto.Util._counter.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral14
Sample
$APPDATA/cl/Crypto.Util.strxor.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$APPDATA/cl/_ctypes.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral16
Sample
$APPDATA/cl/_hashlib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
$APPDATA/cl/_ssl.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral18
Sample
$APPDATA/cl/bz2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
$APPDATA/cl/cl.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral20
Sample
$APPDATA/cl/mklnk.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
$APPDATA/cl/pyexpat.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral22
Sample
$APPDATA/cl/python27.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
$APPDATA/cl/pywintypes27.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral24
Sample
$APPDATA/cl/remove.cmd
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
$APPDATA/cl/select.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral26
Sample
$APPDATA/cl/ui.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
$APPDATA/cl/unicodedata.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral28
Sample
$APPDATA/cl/win32api.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
$APPDATA/cl/win32pdh.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral30
Sample
$APPDATA/cl/win32pipe.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
$APPDATA/cl/win32wnet.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240709-en
General
-
Target
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe
-
Size
1.2MB
-
MD5
6aa468aad5cfed969149dcaca4034b88
-
SHA1
33cbf796ae5cb3c512ddd4c865f88aaa22cadc3c
-
SHA256
44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e
-
SHA512
a121db38f37cff19dcd5ad5dd8e56bdf65c60784eb1e313cf9937c72ef6b6d12622350df191084db65e88dd017b67d2416ff72273d714c5b2e8b96c987760662
-
SSDEEP
24576:f9Q9o30tdl+D5XJHE/7wNsZ8nyaXoGbxLBNoG35WQ9:wdludJk/7wNs6nZXoGbxYQW
Malware Config
Signatures
-
Kills process with taskkill 1 IoCs
pid Process 1592 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1592 taskkill.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1592 4588 44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe 88 PID 4588 wrote to memory of 1592 4588 44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe 88 PID 4588 wrote to memory of 1592 4588 44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe"C:\Users\Admin\AppData\Local\Temp\44f28cd6ea894c05030ab913e2a0f1f1596b4aa7c551df9381f521cb88a92f7e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1592
-