Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
529196d72869de8b9dde0bc0f01ccdd0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
529196d72869de8b9dde0bc0f01ccdd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
529196d72869de8b9dde0bc0f01ccdd0N.exe
-
Size
1.6MB
-
MD5
529196d72869de8b9dde0bc0f01ccdd0
-
SHA1
487bb2222a1b19158a4a0c2c08377fabc1109698
-
SHA256
7201a384c7c2a11fe09269e42354b6f2bb56b8e188e8c328b14bccdd7e63a282
-
SHA512
620154c26d674a16df020cfd390d54d35a5045b0f823e76f321e8a569f021ef467142b35bd08835a927e6934e7dea5bbf9704f34f331c7089251df63a4bbb223
-
SSDEEP
12288:25cqQQdZ0U02cPh+bszyzBc17NFuruQ+rNxicoeYrvZCHVnyVggrSDT5kC8IHDtq:25cAN02cPhBjdZjHhQ6giafmvJW5
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\INF\oem0.PNF 529196d72869de8b9dde0bc0f01ccdd0N.exe File created C:\Windows\INF\oem1.PNF 529196d72869de8b9dde0bc0f01ccdd0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe Token: SeRestorePrivilege 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe Token: SeRestorePrivilege 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe Token: SeRestorePrivilege 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe Token: SeRestorePrivilege 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe Token: SeRestorePrivilege 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe Token: SeRestorePrivilege 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe 1152 529196d72869de8b9dde0bc0f01ccdd0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\529196d72869de8b9dde0bc0f01ccdd0N.exe"C:\Users\Admin\AppData\Local\Temp\529196d72869de8b9dde0bc0f01ccdd0N.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d082aa128d0900e1433c2230318b692f
SHA1b67c08ba627d5563f6d20f340c8d96b38097f8eb
SHA256d8b718501de1f8e49c5cd002cf8ab28a0eae5e19df215fa23641a9b416e68b98
SHA5120288123d00235b7cd396fcbb88d4c5faab14e52d4f41bd1a75924b43dfa9c13538294e697c7e9652cb6839bc7b6c321d2006aa598985668c116c48b3eee5e3e6
-
Filesize
6KB
MD5767f3a8f3ee82158cf4c7a259f38d2f8
SHA138b715a2ea39e3b11cfa46ef04fefa9b7241d839
SHA2565a422b69d9f53ee40a4e686f89dce208ab434f60dfe63984f5033bc8c3b32396
SHA512cf7c31d0d7ec3e0325ee499e8df50d495edb5203725a4469afa781bb473a3e9c6f36165009eb729952477392c0e6b1c59fdb9312f2f605b3f7ca633394d16df8