Overview
overview
10Static
static
1014ed02af2b...e1.exe
windows7-x64
314ed02af2b...e1.exe
windows10-2004-x64
166bcfa4ec...88.exe
windows7-x64
7166bcfa4ec...88.exe
windows10-2004-x64
718f6e53cc2...bc.exe
windows7-x64
318f6e53cc2...bc.exe
windows10-2004-x64
31ecdd2baa0...97.exe
windows7-x64
71ecdd2baa0...97.exe
windows10-2004-x64
7259af5147b...f4.exe
windows7-x64
10259af5147b...f4.exe
windows10-2004-x64
104c8b1c9ed7...16.exe
windows7-x64
34c8b1c9ed7...16.exe
windows10-2004-x64
34cca8b360d...0a.exe
windows7-x64
34cca8b360d...0a.exe
windows10-2004-x64
1057f8e4e1d3...c5.exe
windows7-x64
957f8e4e1d3...c5.exe
windows10-2004-x64
9922cba3477...c3.exe
windows7-x64
3922cba3477...c3.exe
windows10-2004-x64
3b5bd106864...88.exe
windows7-x64
10b5bd106864...88.exe
windows10-2004-x64
10da5f0322d3...24.exe
windows7-x64
7da5f0322d3...24.exe
windows10-2004-x64
8ec7b605aae...33.exe
windows7-x64
7ec7b605aae...33.exe
windows10-2004-x64
9ff70347ce0...0c.exe
windows7-x64
1ff70347ce0...0c.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2025 08:45
Behavioral task
behavioral1
Sample
14ed02af2bfe80834dd59bd49650f5c982da1a9bf2a437450ce113eb6fcf9ee1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
14ed02af2bfe80834dd59bd49650f5c982da1a9bf2a437450ce113eb6fcf9ee1.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
166bcfa4ec03b68bc4ee3fc95806f6d155575be88cbc3c4b7aa5891ca3cc6a88.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
166bcfa4ec03b68bc4ee3fc95806f6d155575be88cbc3c4b7aa5891ca3cc6a88.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
18f6e53cc27bda15c98f79e76f9210bf05b1d8528b96cf4c1523a7aeec7532bc.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
18f6e53cc27bda15c98f79e76f9210bf05b1d8528b96cf4c1523a7aeec7532bc.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
1ecdd2baa03fa76ba2313ef30be6678fda212eaf2878d8e2b9557ad2aec9f197.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
1ecdd2baa03fa76ba2313ef30be6678fda212eaf2878d8e2b9557ad2aec9f197.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
259af5147b99b4c014aeb425aaf236fc76ab60f1aa06efa77027393854e5fff4.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
259af5147b99b4c014aeb425aaf236fc76ab60f1aa06efa77027393854e5fff4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316.exe
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
4c8b1c9ed7ba0d921b0971a3e5de96bfdb3b18024e8880c7aaa2759f13c01316.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
4cca8b360d5053a789ea822ab80261dc6f010c1c72b0d449ca8cdcaffd2e2c0a.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
57f8e4e1d3339c0abadc0f64fc6a4abaff19cd138724cdbb3fae5f37905547c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
57f8e4e1d3339c0abadc0f64fc6a4abaff19cd138724cdbb3fae5f37905547c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
922cba3477ffa83332622df72c2e580fcb3bdd437952c4b6b2c096b4a094acc3.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
922cba3477ffa83332622df72c2e580fcb3bdd437952c4b6b2c096b4a094acc3.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
b5bd1068644f0c38e7aa1cb38dcc40eacf146be9b43d8fd865fddee61ea9a588.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
da5f0322d31a05d525ee8b37a748670be35647c692a85fdb8997742f5fed3524.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
da5f0322d31a05d525ee8b37a748670be35647c692a85fdb8997742f5fed3524.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
ff70347ce0294dc6741692164f65608d9bb47e396486c50da08a94a5b3cbe50c.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
ff70347ce0294dc6741692164f65608d9bb47e396486c50da08a94a5b3cbe50c.exe
Resource
win10v2004-20250129-en
General
-
Target
ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe
-
Size
6.9MB
-
MD5
04ce0c6078e128a91ef031f68304b2c5
-
SHA1
4f34f7395f4bcc9eba528cefcf43b83689ea388d
-
SHA256
ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133
-
SHA512
38cc2b6ecf13f725041700cf8ce4f13796fd12fd49171221f083673201d886174b61d45d9665462373dd2115507eadaa82e44f0e59fd72707400d58f19a73590
-
SSDEEP
196608:y283kdaXMCHGLLc54i1wN+DrRRu7NtbFRKnZMZDYhmh1wlxN8:b/cXMCHWUj7rRQ7XbFsn6ZUEWN
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Loads dropped DLL 2 IoCs
pid Process 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1256 wrote to memory of 5088 1256 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 82 PID 1256 wrote to memory of 5088 1256 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 82 PID 5088 wrote to memory of 860 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 92 PID 5088 wrote to memory of 860 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 92 PID 860 wrote to memory of 3128 860 cmd.exe 94 PID 860 wrote to memory of 3128 860 cmd.exe 94 PID 3128 wrote to memory of 5008 3128 net.exe 95 PID 3128 wrote to memory of 5008 3128 net.exe 95 PID 5088 wrote to memory of 224 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 96 PID 5088 wrote to memory of 224 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 96 PID 224 wrote to memory of 3744 224 cmd.exe 98 PID 224 wrote to memory of 3744 224 cmd.exe 98 PID 3744 wrote to memory of 2836 3744 net.exe 99 PID 3744 wrote to memory of 2836 3744 net.exe 99 PID 5088 wrote to memory of 1228 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 100 PID 5088 wrote to memory of 1228 5088 ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe 100 PID 1228 wrote to memory of 1616 1228 cmd.exe 102 PID 1228 wrote to memory of 1616 1228 cmd.exe 102 PID 1616 wrote to memory of 1948 1616 net.exe 103 PID 1616 wrote to memory of 1948 1616 net.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe"C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe"C:\Users\Admin\AppData\Local\Temp\ec7b605aaefd00f0507f43c78590266b74345bc9308eba26fc542b6a0ae5e133.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net user hoang92bn C1sco123 /add3⤵
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\net.exenet user hoang92bn C1sco123 /add4⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user hoang92bn C1sco123 /add5⤵PID:5008
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net localgroup Administrators hoang92bn /add3⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\system32\net.exenet localgroup Administrators hoang92bn /add4⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup Administrators hoang92bn /add5⤵PID:2836
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net user hoang92bn /active:yes3⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\system32\net.exenet user hoang92bn /active:yes4⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user hoang92bn /active:yes5⤵PID:1948
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5862f820c3251e4ca6fc0ac00e4092239
SHA1ef96d84b253041b090c243594f90938e9a487a9a
SHA25636585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA5122f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e
-
Filesize
83KB
MD5c17dcb7fc227601471a641ec90e6237f
SHA1c93a8c2430e844f40f1d9c880aa74612409ffbb9
SHA25655894b2b98d01f37b9a8cf4daf926d0161ff23c2fb31c56f9dbbac3a61932712
SHA51238851cbd234a51394673a7514110eb43037b4e19d2a6fb79471cc7d01dbcf2695e70df4ba2727c69f1fed56fc7980e3ca37fddff73cc3294a2ea44facdeb0fa9
-
Filesize
274KB
MD5ad4324e5cc794d626ffccda544a5a833
SHA1ef925e000383b6cad9361430fc38264540d434a5
SHA256040f361f63204b55c17a100c260c7ddfadd00866cc055fbd641b83a6747547d5
SHA5120a002b79418242112600b9246da66a5c04651aecb2e245f0220b2544d7b7df67a20139f45ddf2d4e7759ce8cc3d6b4be7f98b0a221c756449eb1b6d7af602325
-
Filesize
63KB
MD5422e214ca76421e794b99f99a374b077
SHA158b24448ab889948303cdefe28a7c697687b7ebc
SHA25678223aef72777efc93c739f5308a3fc5de28b7d10e6975b8947552a62592772b
SHA51203fcccc5a300cc029bef06c601915fa38604d955995b127b5b121cb55fb81752a8a1eec4b1b263ba12c51538080335dabaef9e2b8259b4bf02af84a680552fa0
-
Filesize
155KB
MD566a9028efd1bb12047dafce391fd6198
SHA1e0b61ce28ea940f1f0d5247d40abe61ae2b91293
SHA256e44dea262a24df69fd9b50b08d09ae6f8b051137ce0834640c977091a6f9fca8
SHA5123c2a4e2539933cbeb1d0b3c8ef14f0563675fd53b6ef487c7a5371dfe2ee1932255f91db598a61aaadacd8dc2fe2486a91f586542c52dfc054b22ad843831d1e
-
Filesize
82KB
MD5abf998769f3cba685e90fa06e0ec8326
SHA1daa66047cf22b6be608127f8824e59b30c9026bf
SHA25662d0493ced6ca33e2fd8141649dd9889c23b2e9afc5fdf56edb4f888c88fb823
SHA51208c6b3573c596a15accf4936533567415198a0daab5b6e9824b820fd1f078233bbc3791fde6971489e70155f7c33c1242b0b0a3a17fe2ec95b9fadae555ed483
-
Filesize
1.3MB
MD518c3f8bf07b4764d340df1d612d28fad
SHA1fc0e09078527c13597c37dbea39551f72bbe9ae8
SHA2566e30043dfa5faf9c31bd8fb71778e8e0701275b620696d29ad274846676b7175
SHA512135b97cd0284424a269c964ed95b06d338814e5e7b2271b065e5eabf56a8af4a213d863dd2a1e93c1425fadb1b20e6c63ffa6e8984156928be4a9a2fbbfd5e93
-
Filesize
5.0MB
MD5123ad0908c76ccba4789c084f7a6b8d0
SHA186de58289c8200ed8c1fc51d5f00e38e32c1aad5
SHA2564e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43
SHA51280fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04
-
Filesize
5.8MB
MD53aad23292404a7038eb07ce5a6348256
SHA135cac5479699b28549ebe36c1d064bfb703f0857
SHA25678b1dd211c0e66a0603df48da2c9b67a915ab3258701b9285d3faa255ed8dc25
SHA512f5b6ef04e744d2c98c1ef9402d7a8ce5cda3b008837cf2c37a8b6d0cd1b188ca46585a40b2db7acf019f67e6ced59eff5bc86e1aaf48d3c3b62fecf37f3aec6b
-
Filesize
31KB
MD562fe3761d24b53d98cc9b0cbbd0feb7c
SHA1317344c9edf2fcfa2b9bc248a18f6e6acedafffb
SHA25681f124b01a85882e362a42e94a13c0eff2f4ccd72d461821dc5457a789554413
SHA512a1d3da17937087af4e5980d908ed645d4ea1b5f3ebfab5c572417df064707cae1372b331c7096cc8e2e041db9315172806d3bc4bb425c6bb4d2fa55e00524881
-
Filesize
695KB
MD543b8b61debbc6dd93124a00ddd922d8c
SHA15dee63d250ac6233aac7e462eee65c5326224f01
SHA2563f462ee6e7743a87e5791181936539642e3761c55de3de980a125f91fe21f123
SHA512dd4791045cf887e6722feae4442c38e641f19ec994a8eaf7667e9df9ea84378d6d718caf3390f92443f6bbf39840c150121bb6fa896c4badd3f78f1ffe4de19d