Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe
Resource
win10v2004-20240802-en
General
-
Target
78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe
-
Size
2.0MB
-
MD5
61cf39117e2d4c4e65a86645cecd2974
-
SHA1
a80dbc9f985c1f0938dc1281180b976f26aebb58
-
SHA256
78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351
-
SHA512
dbf18b60bfea0e7d5ffc5593b91f89ab5c83110e0df0db6540628d1cd120cac4395d3305c5cd0ae4e3cb27c4fb0635cf1b2e3aea606b3edcee8ca4fe54481533
-
SSDEEP
24576:EBxcqhG/e37rZ83+zdToZJoAOM08/85RkptVIJqNsqjnhMgeiCl7G0nehbGZpbD:0gi7tbYOMjUfkptVxxDmg27RnWGj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 464 Process not Found 2756 alg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\d1495912f1301b95.bin alg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3028 78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2700 3028 78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe 31 PID 3028 wrote to memory of 2700 3028 78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe 31 PID 3028 wrote to memory of 2700 3028 78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe"C:\Users\Admin\AppData\Local\Temp\78f26c85166563818a5c19b9b3f7d16fcf193455065e6f0d22994e806628d351.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3028 -s 3202⤵PID:2700
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2756
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e893d6099f8f62cb0f297b03ab23ba1f
SHA1fd615f3399541821011d140ba2a86ced2105bce3
SHA25683ab0c14c08cdb4c355a8dcf71f2abc0fef46bf457dda08a1486c8c56529ea6b
SHA512b31003df1a4d503ef90502a1fb6282ebf85a97d106e8e7fe0bf21b02bd62c716d86d52cba2b9be7daebf3165931a23219bc17c7c0c06bb9955e146adedcd6ff1