Analysis

  • max time kernel
    18s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 10:09

General

  • Target

    injector.exe

  • Size

    507KB

  • MD5

    15fa4864c56c1bc724f1098aba8f08fb

  • SHA1

    faad863bfde036ac3ea9c65090fcdf8716d8147c

  • SHA256

    3de2e86dde2444292306215c1082423e8ce8f99f5bf6e036dfb07ac32570c993

  • SHA512

    75b5bd9273078823218cd061cd62d7cf8a8dd98d9e656007998dec0703169d738c760bc17ee51d5c89065c0b43d41e67e53cda3075d228e26d440d099b7e8465

  • SSDEEP

    6144:oG0Sx4x1VJswRYC8baxFIl+DJQATVbohyDOJh67V4CWWlI+8NyxNX2NnRI/d:Wi44wRrEl+DJLdonaz1mNRi

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\injector.exe
    "C:\Users\Admin\AppData\Local\Temp\injector.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:2736
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c color 9
        2⤵
          PID:2180
        • C:\Windows\SoftwareDistribution\Download\IZGKX.exe
          "C:\Windows\SoftwareDistribution\Download\IZGKX.exe"
          2⤵
          • Sets service image path in registry
          • Executes dropped EXE
          • Suspicious behavior: LoadsDriver
          • Suspicious use of AdjustPrivilegeToken
          PID:2876

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Windows\SoftwareDistribution\Download\IZGKX.exe

              Filesize

              100KB

              MD5

              9886a738e05f8a8fe04e9d0c81cc0909

              SHA1

              f659c6a123eb11f6f34f618265dbd54a9aa7f5e3

              SHA256

              abf99bd1d851c4c7015b999e81fb080e7e1147973e6a3a77c8ba7895cc8abbb6

              SHA512

              0d3b9e9a1a38efe1e963b929a33a8a13d4636d8056ab04fce958333db983b9fb401946c9b6990d18e9c2e2d4c2dbd2fb6aae5385e4234a5d86ef8adb98d56a21