Analysis
-
max time kernel
2s -
max time network
4s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-09-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
dropper.exe
Resource
win11-20240802-en
General
-
Target
dropper.exe
-
Size
33.5MB
-
MD5
5e84cd460ac5eb9ee72dd2f831297b52
-
SHA1
17960e740ac5596b5025ab0515383df0db3b8753
-
SHA256
8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d
-
SHA512
c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de
-
SSDEEP
786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000\Software\Microsoft\Windows\CurrentVersion\Run\loader = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Shell\\loader.bat" dropper.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3252 wmic.exe Token: SeSecurityPrivilege 3252 wmic.exe Token: SeTakeOwnershipPrivilege 3252 wmic.exe Token: SeLoadDriverPrivilege 3252 wmic.exe Token: SeSystemProfilePrivilege 3252 wmic.exe Token: SeSystemtimePrivilege 3252 wmic.exe Token: SeProfSingleProcessPrivilege 3252 wmic.exe Token: SeIncBasePriorityPrivilege 3252 wmic.exe Token: SeCreatePagefilePrivilege 3252 wmic.exe Token: SeBackupPrivilege 3252 wmic.exe Token: SeRestorePrivilege 3252 wmic.exe Token: SeShutdownPrivilege 3252 wmic.exe Token: SeDebugPrivilege 3252 wmic.exe Token: SeSystemEnvironmentPrivilege 3252 wmic.exe Token: SeRemoteShutdownPrivilege 3252 wmic.exe Token: SeUndockPrivilege 3252 wmic.exe Token: SeManageVolumePrivilege 3252 wmic.exe Token: 33 3252 wmic.exe Token: 34 3252 wmic.exe Token: 35 3252 wmic.exe Token: 36 3252 wmic.exe Token: SeIncreaseQuotaPrivilege 3252 wmic.exe Token: SeSecurityPrivilege 3252 wmic.exe Token: SeTakeOwnershipPrivilege 3252 wmic.exe Token: SeLoadDriverPrivilege 3252 wmic.exe Token: SeSystemProfilePrivilege 3252 wmic.exe Token: SeSystemtimePrivilege 3252 wmic.exe Token: SeProfSingleProcessPrivilege 3252 wmic.exe Token: SeIncBasePriorityPrivilege 3252 wmic.exe Token: SeCreatePagefilePrivilege 3252 wmic.exe Token: SeBackupPrivilege 3252 wmic.exe Token: SeRestorePrivilege 3252 wmic.exe Token: SeShutdownPrivilege 3252 wmic.exe Token: SeDebugPrivilege 3252 wmic.exe Token: SeSystemEnvironmentPrivilege 3252 wmic.exe Token: SeRemoteShutdownPrivilege 3252 wmic.exe Token: SeUndockPrivilege 3252 wmic.exe Token: SeManageVolumePrivilege 3252 wmic.exe Token: 33 3252 wmic.exe Token: 34 3252 wmic.exe Token: 35 3252 wmic.exe Token: 36 3252 wmic.exe Token: SeDebugPrivilege 3960 dropper.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3960 wrote to memory of 3252 3960 dropper.exe 79 PID 3960 wrote to memory of 3252 3960 dropper.exe 79 PID 3960 wrote to memory of 236 3960 dropper.exe 82 PID 3960 wrote to memory of 236 3960 dropper.exe 82 PID 3960 wrote to memory of 2240 3960 dropper.exe 84 PID 3960 wrote to memory of 2240 3960 dropper.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\dropper.exe"C:\Users\Admin\AppData\Local\Temp\dropper.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" diskdrive get Model2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\SYSTEM32\findstr.exe"findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"2⤵PID:236
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"2⤵PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20B
MD53f3a41bd8b90767fc6aac3793137c6f3
SHA18709a86ed2364a4daf7c443770b1f3fefc6d7529
SHA25641b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80
SHA5127555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8