Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe
Resource
win7-20240611-en
General
-
Target
416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe
-
Size
4.4MB
-
MD5
c5f20b0cb835adff91c281ba3e9995e3
-
SHA1
b7edfc4fb9befe9acf241e423741e27d68dfd832
-
SHA256
416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b
-
SHA512
233587e39de30cfa0a9526fb041f9c9c70a1e7574e8bd8d934f7b795f3eff2a8aa8e98f20a7fcb06f00c85c233461d56bbabb4bba39c1ac4869839e3f0022678
-
SSDEEP
49152:e+PcYB/o36ki63Hw4/uzcdl3ne2xAOVmmgZV099snm9pswB0Nq7:tPcYB/y6ki6PnuwT06sajB0Nq7
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exepid process 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exedescription pid process Token: SeDebugPrivilege 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exedescription pid process target process PID 1252 wrote to memory of 2676 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2676 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2676 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2676 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2504 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2504 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2504 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2504 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2512 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2512 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2512 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2512 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2520 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2520 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2520 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2520 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2552 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2552 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2552 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe PID 1252 wrote to memory of 2552 1252 416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe"C:\Users\Admin\AppData\Local\Temp\416b40630daa924136b9d10e0faa8c800a7a882416f4e5b7944f9bc2553a414b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1252-0-0x0000000074E8E000-0x0000000074E8F000-memory.dmpFilesize
4KB
-
memory/1252-1-0x0000000000270000-0x00000000006D2000-memory.dmpFilesize
4.4MB
-
memory/1252-2-0x0000000000800000-0x000000000080A000-memory.dmpFilesize
40KB
-
memory/1252-3-0x0000000074E80000-0x000000007556E000-memory.dmpFilesize
6.9MB
-
memory/1252-4-0x0000000005030000-0x000000000513C000-memory.dmpFilesize
1.0MB
-
memory/1252-5-0x0000000000D30000-0x0000000000D4C000-memory.dmpFilesize
112KB
-
memory/1252-10-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-6-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-65-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-63-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-61-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-59-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-58-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-55-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-54-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-66-0x0000000074E80000-0x000000007556E000-memory.dmpFilesize
6.9MB
-
memory/1252-51-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-49-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-47-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-46-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-43-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-42-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-39-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-37-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-67-0x0000000074E80000-0x000000007556E000-memory.dmpFilesize
6.9MB
-
memory/1252-35-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-34-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-31-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-29-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-28-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-25-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-23-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-21-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-19-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-18-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-15-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-13-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-11-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB
-
memory/1252-7-0x0000000000D30000-0x0000000000D45000-memory.dmpFilesize
84KB