Analysis
-
max time kernel
49s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 03:56
Behavioral task
behavioral1
Sample
Account Method v3.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Account Method v3.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Account Method.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Account Method.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
���QS�l.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
���QS�l.pyc
Resource
win10v2004-20241007-en
General
-
Target
Account Method v3.rar
-
Size
5.9MB
-
MD5
8a4cd510c6efeefc9fc33465814b71b2
-
SHA1
b9c1e5dfccdf13ddb0206da9f195f27cb63b32a1
-
SHA256
7a43e7fa643bf4e892994c61314aa265ea1e1c46af5313c4cdd90a66f6507b9b
-
SHA512
9757d25393bf7d1a676813c615069f52186bf1f9a5746f28847f8897a97e9dee6b1a3b0f2b3dd4d4f1670143c0eae9fee0df0bcc40721370385440b52228c8d6
-
SSDEEP
98304:+YMKVhn+UVUcFhhkiW27e1V6OuP+W4M0o6YcSvJF1AnKGq2j7UWAvE8WHL:+JK7+rcFho5u+WR0o6YNJF1h2HwE1r
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2832 Account Method.exe 1128 Account Method.exe -
Loads dropped DLL 5 IoCs
pid Process 1904 7zFM.exe 2832 Account Method.exe 1128 Account Method.exe 1204 Process not Found 1204 Process not Found -
resource yara_rule behavioral1/files/0x000600000001937b-33.dat upx behavioral1/memory/1128-35-0x000007FEF4ED0000-0x000007FEF533E000-memory.dmp upx behavioral1/memory/1128-38-0x000007FEF4ED0000-0x000007FEF533E000-memory.dmp upx -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1904 7zFM.exe Token: 35 1904 7zFM.exe Token: SeSecurityPrivilege 1904 7zFM.exe Token: SeSecurityPrivilege 1904 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1904 7zFM.exe 1904 7zFM.exe 1904 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2832 1904 7zFM.exe 33 PID 1904 wrote to memory of 2832 1904 7zFM.exe 33 PID 1904 wrote to memory of 2832 1904 7zFM.exe 33 PID 2832 wrote to memory of 1128 2832 Account Method.exe 34 PID 2832 wrote to memory of 1128 2832 Account Method.exe 34 PID 2832 wrote to memory of 1128 2832 Account Method.exe 34
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Account Method v3.rar"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\7zO077523A7\Account Method.exe"C:\Users\Admin\AppData\Local\Temp\7zO077523A7\Account Method.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\7zO077523A7\Account Method.exe"C:\Users\Admin\AppData\Local\Temp\7zO077523A7\Account Method.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2264
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD5533098d68bed52f271ccacc2ff9b90dc
SHA19c73399366c258bc43f0a64f2caef51cc60a6df1
SHA256369b6cecb9a25012323387c19abe99e8c82370f22c941172949c2458d8f4f2a2
SHA5125d3138178bcf2c2fa1d80a2ad09b3e4af7a58386c60c85ad7d32c3460c40294eb1f1ca9ba10cc76f87e4152c235b33829534bc04320fa1ab62489a0b4069989a
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee