Analysis
-
max time kernel
38s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 15:24
Behavioral task
behavioral1
Sample
AMDupeExploit.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AMDupeExploit.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
AMDupeExploit.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
AMDupeExploit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
y�lrz�B.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
y�lrz�B.pyc
Resource
win10v2004-20241007-en
General
-
Target
AMDupeExploit.rar
-
Size
6.7MB
-
MD5
6a082af24d420bdcc6f63c23fb641589
-
SHA1
4aefd2b3432f052336d2716fa5881304cbcd68a2
-
SHA256
aa5b7367b2b86a3b6e6847a7b168d153e1267c84da8e60b7c9a92a5dfb504fe4
-
SHA512
ab0018b9b00e57a7ec8db9d4d734cc9d4e3de2814b8ef6559acb1fb0fad540a62a179ac50d368a1a58d05653dc4499bb4c7578b8b2b9b84de5f9b22277d252c0
-
SSDEEP
196608:T8591bzyr9dtk9k5ADOWgimO1iw9YcH3b1XjUXAH:T859JWr9PkmlWgTSmcH3BjUY
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2776 AMDupeExploit.exe 2948 AMDupeExploit.exe -
Loads dropped DLL 5 IoCs
pid Process 2920 7zFM.exe 2776 AMDupeExploit.exe 2948 AMDupeExploit.exe 1176 Process not Found 1176 Process not Found -
resource yara_rule behavioral1/files/0x0006000000016ee0-31.dat upx behavioral1/memory/2948-33-0x000007FEF6750000-0x000007FEF6D3A000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2920 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2920 7zFM.exe Token: 35 2920 7zFM.exe Token: SeSecurityPrivilege 2920 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2920 7zFM.exe 2920 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2776 2920 7zFM.exe 28 PID 2920 wrote to memory of 2776 2920 7zFM.exe 28 PID 2920 wrote to memory of 2776 2920 7zFM.exe 28 PID 2776 wrote to memory of 2948 2776 AMDupeExploit.exe 29 PID 2776 wrote to memory of 2948 2776 AMDupeExploit.exe 29 PID 2776 wrote to memory of 2948 2776 AMDupeExploit.exe 29
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\AMDupeExploit.rar"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\7zO86BBDD56\AMDupeExploit.exe"C:\Users\Admin\AppData\Local\Temp\7zO86BBDD56\AMDupeExploit.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\7zO86BBDD56\AMDupeExploit.exe"C:\Users\Admin\AppData\Local\Temp\7zO86BBDD56\AMDupeExploit.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2732
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51e76961ca11f929e4213fca8272d0194
SHA1e52763b7ba970c3b14554065f8c2404112f53596
SHA2568a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b
-
Filesize
17.0MB
MD5d67b6fd7be094652214db99a7ecb05bd
SHA18f444caa0ca2fe7684d203692cd954bf13b53473
SHA256a290a4596cfd35a9b95561fb9a95f292b2244005046e545020735ae850c98d6e
SHA512b7a7b4baad87526a97000b1e0108985a2f332bff948c1bec6d2192d3be1de9768b171f842b255db60f7938b2e11aed55c1cf786187e23b2e78c3356454075076