Analysis
-
max time kernel
91s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-09-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
dropper.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
dropper.exe
Resource
win11-20240802-en
General
-
Target
dropper.exe
-
Size
33.5MB
-
MD5
5e84cd460ac5eb9ee72dd2f831297b52
-
SHA1
17960e740ac5596b5025ab0515383df0db3b8753
-
SHA256
8c473bf936fd8076a2330dbc420ed96b96a6169f747aab0129705e1d4e57309d
-
SHA512
c670120cea8eef9ff2f017e1d13470774a155cbc5e47877adf45ed37a91afa89eee6903fd7b848d99a5cd0aed4c5619541928ea0ed63caeb866c0a68ca1a14de
-
SSDEEP
786432:lkghL+KScDz/3G5qz0dwUOA9ZCVgQKwWCIPwUT49Zf3/b:agB7Db25qz0dQAUgGXIPwbZnb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\Windows\CurrentVersion\Run\loader = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\Windows\\Shell\\loader.bat" dropper.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3720 wmic.exe Token: SeSecurityPrivilege 3720 wmic.exe Token: SeTakeOwnershipPrivilege 3720 wmic.exe Token: SeLoadDriverPrivilege 3720 wmic.exe Token: SeSystemProfilePrivilege 3720 wmic.exe Token: SeSystemtimePrivilege 3720 wmic.exe Token: SeProfSingleProcessPrivilege 3720 wmic.exe Token: SeIncBasePriorityPrivilege 3720 wmic.exe Token: SeCreatePagefilePrivilege 3720 wmic.exe Token: SeBackupPrivilege 3720 wmic.exe Token: SeRestorePrivilege 3720 wmic.exe Token: SeShutdownPrivilege 3720 wmic.exe Token: SeDebugPrivilege 3720 wmic.exe Token: SeSystemEnvironmentPrivilege 3720 wmic.exe Token: SeRemoteShutdownPrivilege 3720 wmic.exe Token: SeUndockPrivilege 3720 wmic.exe Token: SeManageVolumePrivilege 3720 wmic.exe Token: 33 3720 wmic.exe Token: 34 3720 wmic.exe Token: 35 3720 wmic.exe Token: 36 3720 wmic.exe Token: SeIncreaseQuotaPrivilege 3720 wmic.exe Token: SeSecurityPrivilege 3720 wmic.exe Token: SeTakeOwnershipPrivilege 3720 wmic.exe Token: SeLoadDriverPrivilege 3720 wmic.exe Token: SeSystemProfilePrivilege 3720 wmic.exe Token: SeSystemtimePrivilege 3720 wmic.exe Token: SeProfSingleProcessPrivilege 3720 wmic.exe Token: SeIncBasePriorityPrivilege 3720 wmic.exe Token: SeCreatePagefilePrivilege 3720 wmic.exe Token: SeBackupPrivilege 3720 wmic.exe Token: SeRestorePrivilege 3720 wmic.exe Token: SeShutdownPrivilege 3720 wmic.exe Token: SeDebugPrivilege 3720 wmic.exe Token: SeSystemEnvironmentPrivilege 3720 wmic.exe Token: SeRemoteShutdownPrivilege 3720 wmic.exe Token: SeUndockPrivilege 3720 wmic.exe Token: SeManageVolumePrivilege 3720 wmic.exe Token: 33 3720 wmic.exe Token: 34 3720 wmic.exe Token: 35 3720 wmic.exe Token: 36 3720 wmic.exe Token: SeDebugPrivilege 4716 dropper.exe Token: SeIncreaseQuotaPrivilege 764 wmic.exe Token: SeSecurityPrivilege 764 wmic.exe Token: SeTakeOwnershipPrivilege 764 wmic.exe Token: SeLoadDriverPrivilege 764 wmic.exe Token: SeSystemProfilePrivilege 764 wmic.exe Token: SeSystemtimePrivilege 764 wmic.exe Token: SeProfSingleProcessPrivilege 764 wmic.exe Token: SeIncBasePriorityPrivilege 764 wmic.exe Token: SeCreatePagefilePrivilege 764 wmic.exe Token: SeBackupPrivilege 764 wmic.exe Token: SeRestorePrivilege 764 wmic.exe Token: SeShutdownPrivilege 764 wmic.exe Token: SeDebugPrivilege 764 wmic.exe Token: SeSystemEnvironmentPrivilege 764 wmic.exe Token: SeRemoteShutdownPrivilege 764 wmic.exe Token: SeUndockPrivilege 764 wmic.exe Token: SeManageVolumePrivilege 764 wmic.exe Token: 33 764 wmic.exe Token: 34 764 wmic.exe Token: 35 764 wmic.exe Token: 36 764 wmic.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4716 wrote to memory of 3720 4716 dropper.exe 80 PID 4716 wrote to memory of 3720 4716 dropper.exe 80 PID 4716 wrote to memory of 5068 4716 dropper.exe 83 PID 4716 wrote to memory of 5068 4716 dropper.exe 83 PID 4716 wrote to memory of 2744 4716 dropper.exe 85 PID 4716 wrote to memory of 2744 4716 dropper.exe 85 PID 2172 wrote to memory of 3524 2172 cmd.exe 91 PID 2172 wrote to memory of 3524 2172 cmd.exe 91 PID 3524 wrote to memory of 764 3524 dropper.exe 92 PID 3524 wrote to memory of 764 3524 dropper.exe 92 PID 3524 wrote to memory of 2132 3524 dropper.exe 94 PID 3524 wrote to memory of 2132 3524 dropper.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\dropper.exe"C:\Users\Admin\AppData\Local\Temp\dropper.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" diskdrive get Model2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SYSTEM32\findstr.exe"findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"2⤵PID:5068
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C "C:\Users\Admin\AppData\Local\Microsoft\Windows\Shell\loader.bat"2⤵PID:2744
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1848
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\dropper.exedropper.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" diskdrive get Model3⤵
- Suspicious use of AdjustPrivilegeToken
PID:764
-
-
C:\Windows\SYSTEM32\findstr.exe"findstr.exe" /i "DADY HARDDISK QEMU HARDDISK WDC WDS100T2B0A"3⤵PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20B
MD53f3a41bd8b90767fc6aac3793137c6f3
SHA18709a86ed2364a4daf7c443770b1f3fefc6d7529
SHA25641b9efbeb8fe9a6f96a7ad64edbf1d06a24d5d4574d380191411af3d64614c80
SHA5127555b2ec9e6b0a2c1eaaff954b0a7d5421f1b5b79b38261d5d5c1d5b41699047a2db2593b679ac454cd5e083508961d5689f5880136faf2470e9219463c37dc8