Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:27
Static task
static1
Behavioral task
behavioral1
Sample
5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe
Resource
win7-20240704-en
General
-
Target
5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe
-
Size
2.0MB
-
MD5
fb29230b78275aef586ed66c97f4840f
-
SHA1
c56d8cde2214ca3d9032f5e25e0ac04c35422547
-
SHA256
5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28
-
SHA512
19c70bcd9bf343bad19bfe77068c8cc5250a4e8ab2bfeef160bc821e95087a306bb3e8dd00c726c251ccc393c25a4cbc648ff30e7ce7232b66babf8258a847c9
-
SSDEEP
49152:gvRwdG2NcOMjUfkptVxB2yEBSUoWs3bF:gpwdGVjUu5Qyi1Ps3b
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 476 Process not Found 1160 alg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\8a1a2f99d03a5d9e.bin alg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2548 5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1448 2548 5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe 31 PID 2548 wrote to memory of 1448 2548 5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe 31 PID 2548 wrote to memory of 1448 2548 5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe"C:\Users\Admin\AppData\Local\Temp\5961f96cb72c95a056cf1545cead0cd14f4cab213c5a52c76efd8c10c1057a28.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2548 -s 3282⤵PID:1448
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1160
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5eb5f4e7fe196e1bb1e5678c614a168eb
SHA1600d3ac5a5b494db7dca1e0a70da46c95ce8ccd6
SHA25649c8c49ca04f53903fda7caf69851e651ba40747a029bb324479f023334a6931
SHA512196b1caff554c4c9141cd53423cc3d0feb5e0b28820bb7289372ac26dce720fbcbac5cb83b6613877a07447d1565c57c9d555930d2a5b3975a7a7c369942ad5a
-
Filesize
1.4MB
MD573e5339e0540016d5d85f3858c26d151
SHA1e9b010537da4556e97a97ac48931de04b7d16c41
SHA256bc37f02573a3947ab89c077476e2c5d5ffd6d9e0fbc82862881b17483d326522
SHA512c287e756dfe9ee55ad9affb474fd852d30cf377da6a521df08d26516ba6a6762253a8acacf4d39be9191563ac73fbd665065234698f411924fe52916b20236ff