Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
dropper.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
dropper.exe
Resource
win11-20240802-en
General
-
Target
dropper.exe
-
Size
33.5MB
-
MD5
5e84cd460ac5eb9ee72dd2f831297b52
-
SHA1
17960e740ac5596b5025ab0515383df0db3b8753
-
SHA256
8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d
-
SHA512
c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de
-
SSDEEP
786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000\Software\Microsoft\Windows\CurrentVersion\Run\loader = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Shell\\loader.bat" dropper.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4636 wmic.exe Token: SeSecurityPrivilege 4636 wmic.exe Token: SeTakeOwnershipPrivilege 4636 wmic.exe Token: SeLoadDriverPrivilege 4636 wmic.exe Token: SeSystemProfilePrivilege 4636 wmic.exe Token: SeSystemtimePrivilege 4636 wmic.exe Token: SeProfSingleProcessPrivilege 4636 wmic.exe Token: SeIncBasePriorityPrivilege 4636 wmic.exe Token: SeCreatePagefilePrivilege 4636 wmic.exe Token: SeBackupPrivilege 4636 wmic.exe Token: SeRestorePrivilege 4636 wmic.exe Token: SeShutdownPrivilege 4636 wmic.exe Token: SeDebugPrivilege 4636 wmic.exe Token: SeSystemEnvironmentPrivilege 4636 wmic.exe Token: SeRemoteShutdownPrivilege 4636 wmic.exe Token: SeUndockPrivilege 4636 wmic.exe Token: SeManageVolumePrivilege 4636 wmic.exe Token: 33 4636 wmic.exe Token: 34 4636 wmic.exe Token: 35 4636 wmic.exe Token: 36 4636 wmic.exe Token: SeIncreaseQuotaPrivilege 4636 wmic.exe Token: SeSecurityPrivilege 4636 wmic.exe Token: SeTakeOwnershipPrivilege 4636 wmic.exe Token: SeLoadDriverPrivilege 4636 wmic.exe Token: SeSystemProfilePrivilege 4636 wmic.exe Token: SeSystemtimePrivilege 4636 wmic.exe Token: SeProfSingleProcessPrivilege 4636 wmic.exe Token: SeIncBasePriorityPrivilege 4636 wmic.exe Token: SeCreatePagefilePrivilege 4636 wmic.exe Token: SeBackupPrivilege 4636 wmic.exe Token: SeRestorePrivilege 4636 wmic.exe Token: SeShutdownPrivilege 4636 wmic.exe Token: SeDebugPrivilege 4636 wmic.exe Token: SeSystemEnvironmentPrivilege 4636 wmic.exe Token: SeRemoteShutdownPrivilege 4636 wmic.exe Token: SeUndockPrivilege 4636 wmic.exe Token: SeManageVolumePrivilege 4636 wmic.exe Token: 33 4636 wmic.exe Token: 34 4636 wmic.exe Token: 35 4636 wmic.exe Token: 36 4636 wmic.exe Token: SeDebugPrivilege 204 dropper.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 204 wrote to memory of 4636 204 dropper.exe 75 PID 204 wrote to memory of 4636 204 dropper.exe 75 PID 204 wrote to memory of 4884 204 dropper.exe 78 PID 204 wrote to memory of 4884 204 dropper.exe 78 PID 204 wrote to memory of 1092 204 dropper.exe 80 PID 204 wrote to memory of 1092 204 dropper.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\dropper.exe"C:\Users\Admin\AppData\Local\Temp\dropper.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" diskdrive get Model2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\SYSTEM32\findstr.exe"findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"2⤵PID:4884
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"2⤵PID:1092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20B
MD53f3a41bd8b90767fc6aac3793137c6f3
SHA18709a86ed2364a4daf7c443770b1f3fefc6d7529
SHA25641b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80
SHA5127555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8