Analysis
-
max time kernel
50s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-03-2023 06:09
Static task
static1
Behavioral task
behavioral1
Sample
d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe
Resource
win10-20230220-en
General
-
Target
d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe
-
Size
4.4MB
-
MD5
a4d7aa910a1daa1fc605e5d85b3520ef
-
SHA1
9653ddbf2cc537bdfd2cb7f8b5def4c4b9798286
-
SHA256
d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d
-
SHA512
b182acb7873f1a695982c168b7a9fdbbffcf9144810551429ed689caf847928682b2a3ff326038a2fa295b0bb8996cda0b42770bdc91e63c7a1d75d7bce559e3
-
SSDEEP
98304:ic31RBC96etJeZ3G9LWme1lZW03xLiSJOIQMEy8PyEpzVQa/H1YMlJ:L/+64JeBILWmeLw03dRJpP8PHb/HNJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4084 OracleWindowsHolographicDevices-Type3.3.3.1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\OracleWindowsHolographicDevices-Type3.3.3.1 = "C:\\ProgramData\\OracleWindowsHolographicDevices-Type3.3.3.1\\OracleWindowsHolographicDevices-Type3.3.3.1.exe" AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1232 set thread context of 1776 1232 d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe 67 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1776 1232 d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe 67 PID 1232 wrote to memory of 1776 1232 d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe 67 PID 1232 wrote to memory of 1776 1232 d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe 67 PID 1232 wrote to memory of 1776 1232 d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe 67 PID 1232 wrote to memory of 1776 1232 d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe 67 PID 1776 wrote to memory of 4084 1776 AppLaunch.exe 68 PID 1776 wrote to memory of 4084 1776 AppLaunch.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe"C:\Users\Admin\AppData\Local\Temp\d325a89e7ef3af53da0c5a7787681a418f06e42804a70820fcfe3168ed48036d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\ProgramData\OracleWindowsHolographicDevices-Type3.3.3.1\OracleWindowsHolographicDevices-Type3.3.3.1.exe"C:\ProgramData\OracleWindowsHolographicDevices-Type3.3.3.1\OracleWindowsHolographicDevices-Type3.3.3.1.exe"3⤵
- Executes dropped EXE
PID:4084
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\OracleWindowsHolographicDevices-Type3.3.3.1\OracleWindowsHolographicDevices-Type3.3.3.1.exe
Filesize847.2MB
MD5a137c9e96787ead8a13fb6410237ae13
SHA1565bd812c99bf1204d2d68c1787f379497a51253
SHA256e89731f86ac24d0d52a67a2783bff4f858c891673afb92f889644fef083314c1
SHA512c313702930d2c031745a1678c6e2555579baa54c6d911f23fadfd533c1b98cca5f51194e5c21f04b249080d4b54e8c871b4fd057fcc3b8a41a29542394d0926b
-
C:\ProgramData\OracleWindowsHolographicDevices-Type3.3.3.1\OracleWindowsHolographicDevices-Type3.3.3.1.exe
Filesize847.2MB
MD5a137c9e96787ead8a13fb6410237ae13
SHA1565bd812c99bf1204d2d68c1787f379497a51253
SHA256e89731f86ac24d0d52a67a2783bff4f858c891673afb92f889644fef083314c1
SHA512c313702930d2c031745a1678c6e2555579baa54c6d911f23fadfd533c1b98cca5f51194e5c21f04b249080d4b54e8c871b4fd057fcc3b8a41a29542394d0926b