Resubmissions
15/01/2025, 15:44
250115-s6kp1axjhs 1015/01/2025, 14:52
250115-r81cssxlgr 1015/01/2025, 14:49
250115-r7dseawjhs 10Analysis
-
max time kernel
19s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe
Resource
win10v2004-20241007-en
General
-
Target
e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe
-
Size
6.1MB
-
MD5
df8186565b9760042af7f12fb42a2de2
-
SHA1
11311a96335df5237fa479716365bffd8004a103
-
SHA256
e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864
-
SHA512
4f84deddf8d3290f7a8ed8cae7f571e04a2334b5ecae31b57f545099ec56d3f11fcea16dd5b190a69c203930a909ef7bf03536499c19c402693bc59f9dd3651f
-
SSDEEP
196608:2SkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:HkSopwtQQl2aOtXADu8X9Y95GQLJ
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 4 raw.githubusercontent.com 5 raw.githubusercontent.com 8 raw.githubusercontent.com 9 raw.githubusercontent.com 10 raw.githubusercontent.com 11 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2124 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 564 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2340 e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe Token: SeDebugPrivilege 564 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1600 2340 e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe 31 PID 2340 wrote to memory of 1600 2340 e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe 31 PID 2340 wrote to memory of 1600 2340 e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe 31 PID 1600 wrote to memory of 748 1600 cmd.exe 33 PID 1600 wrote to memory of 748 1600 cmd.exe 33 PID 1600 wrote to memory of 748 1600 cmd.exe 33 PID 1600 wrote to memory of 564 1600 cmd.exe 34 PID 1600 wrote to memory of 564 1600 cmd.exe 34 PID 1600 wrote to memory of 564 1600 cmd.exe 34 PID 1600 wrote to memory of 2124 1600 cmd.exe 35 PID 1600 wrote to memory of 2124 1600 cmd.exe 35 PID 1600 wrote to memory of 2124 1600 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe"C:\Users\Admin\AppData\Local\Temp\e7d30fd97d59ed644b2344b8cf8e1d86531032474542f2bba1bc253cffcf5864.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\f2266a7d-2de2-4cc7-94cc-40aeba9abd85.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:748
-
-
C:\Windows\system32\taskkill.exetaskkill /F /PID 23403⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
C:\Windows\system32\timeout.exetimeout /T 2 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:2124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
152B
MD57880ed344fa33bbf6e402594e2046212
SHA1e62c7c86f0ad6c9b1f078fe9449270e9eb7a42e1
SHA2564a9db40e95f431a602e65034bddfd3363704cb6deb1c7221128a9626acff7dd9
SHA51224e7c4d1914e616e716ece0cf8ea80d42a5fee71ee35fe31367592b308f2ceb1560cb07b61de01ab029ea20eded484455b54285289fbbc82665dc54e1cb7f21f