Analysis
-
max time kernel
39s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/04/2023, 05:36
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20230220-en
General
-
Target
1.exe
-
Size
472KB
-
MD5
7d279adf529721141bbb6768ed039ac5
-
SHA1
498ec140dc0f1763bbb37d5b9194fc1448e4596b
-
SHA256
0b3e1559b5ecac6846f44a8d6c2abc0d58816499e148500532b3c66e426ef23c
-
SHA512
2fd563f58014f9df9c98496252047b1f2c5f8288065656e705d4e97aec3b3cabf7c22e070cfbc6f4d0b9c26adbeda4e8a0606010c2ffa0e93816f3ba852ebbf3
-
SSDEEP
12288:bLHzRv6FusqtneXYPWv6oSm93yOz93yO:bDzRv6FutnPsN3R3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1228 MNvEbYkS.exe -
Loads dropped DLL 2 IoCs
pid Process 1716 1.exe 1228 MNvEbYkS.exe -
resource yara_rule behavioral1/memory/1716-54-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral1/memory/1716-60-0x0000000000400000-0x000000000051C000-memory.dmp upx behavioral1/memory/1716-72-0x0000000000400000-0x000000000051C000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: MNvEbYkS.exe File opened (read-only) \??\R: MNvEbYkS.exe File opened (read-only) \??\Y: MNvEbYkS.exe File opened (read-only) \??\Q: MNvEbYkS.exe File opened (read-only) \??\U: MNvEbYkS.exe File opened (read-only) \??\Z: MNvEbYkS.exe File opened (read-only) \??\H: MNvEbYkS.exe File opened (read-only) \??\I: MNvEbYkS.exe File opened (read-only) \??\N: MNvEbYkS.exe File opened (read-only) \??\S: MNvEbYkS.exe File opened (read-only) \??\V: MNvEbYkS.exe File opened (read-only) \??\W: MNvEbYkS.exe File opened (read-only) \??\X: MNvEbYkS.exe File opened (read-only) \??\F: MNvEbYkS.exe File opened (read-only) \??\K: MNvEbYkS.exe File opened (read-only) \??\M: MNvEbYkS.exe File opened (read-only) \??\L: MNvEbYkS.exe File opened (read-only) \??\P: MNvEbYkS.exe File opened (read-only) \??\T: MNvEbYkS.exe File opened (read-only) \??\E: MNvEbYkS.exe File opened (read-only) \??\G: MNvEbYkS.exe File opened (read-only) \??\J: MNvEbYkS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1716 1.exe 1228 MNvEbYkS.exe 1228 MNvEbYkS.exe 1228 MNvEbYkS.exe 1228 MNvEbYkS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1716 wrote to memory of 1228 1716 1.exe 27 PID 1716 wrote to memory of 1228 1716 1.exe 27 PID 1716 wrote to memory of 1228 1716 1.exe 27 PID 1716 wrote to memory of 1228 1716 1.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Public\Videos\MNvEbYkS.exe"C:\Users\Public\Videos\MNvEbYkS.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
905KB
MD5790c885de6cd9b130bbfb8332652b0fc
SHA15c9d3aaa43c7982e98d33c7d5c50e42fd84493df
SHA256c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b
SHA5127cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304
-
Filesize
905KB
MD5790c885de6cd9b130bbfb8332652b0fc
SHA15c9d3aaa43c7982e98d33c7d5c50e42fd84493df
SHA256c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b
SHA5127cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304
-
Filesize
905KB
MD5790c885de6cd9b130bbfb8332652b0fc
SHA15c9d3aaa43c7982e98d33c7d5c50e42fd84493df
SHA256c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b
SHA5127cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304
-
Filesize
99KB
MD5ea4aac0fe87c49a53c0af366fae61fed
SHA148a6154b37cf84e61284ac04c677afce554e6677
SHA256cbccaabe5611e406c041c24e22b90bba6a64eda5113a0faebc7ef3960b04452b
SHA512303ed937f931ae3289f228b3ae4d48cd4bd9f19ea54221589b6cfd2cb95b37a0b4d8e2a44e6daae07d46855ccd63ee671147771081f426349cbc441b9016721f
-
Filesize
905KB
MD5790c885de6cd9b130bbfb8332652b0fc
SHA15c9d3aaa43c7982e98d33c7d5c50e42fd84493df
SHA256c39d7f48548c8ee0b8dc36f4d4a452658fa5f3308bcb2c7bf181dc4e09191e8b
SHA5127cf09b39a2f9f07d3259d6f01f793bf89ec19c46aad0f8feb9541ddef21e1b4459b8a3042aa8aa1bf2fc31f00e64cd40485e5cb5e3474757bcded1a55e4b7304
-
Filesize
99KB
MD5ea4aac0fe87c49a53c0af366fae61fed
SHA148a6154b37cf84e61284ac04c677afce554e6677
SHA256cbccaabe5611e406c041c24e22b90bba6a64eda5113a0faebc7ef3960b04452b
SHA512303ed937f931ae3289f228b3ae4d48cd4bd9f19ea54221589b6cfd2cb95b37a0b4d8e2a44e6daae07d46855ccd63ee671147771081f426349cbc441b9016721f