Analysis
-
max time kernel
24s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
11-05-2023 02:32
Static task
static1
Behavioral task
behavioral1
Sample
fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe
Resource
win10v2004-20230220-en
General
-
Target
fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe
-
Size
4.7MB
-
MD5
23a1c8fcfd0b9038a311a7514b33385b
-
SHA1
3bfcab9d00a392c22ffbab60cec9e1d9d78026e6
-
SHA256
fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b
-
SHA512
e790c1ae8e72b5c537a07e7ba6889251b6c8bbcbb0f9a27e47153f34cb183dd16fd44f928632465e9090fe59cb989d7a7987f4a6490f3c167b003f0bfbd7784b
-
SSDEEP
98304:s+AkCiG8mDz99UlHuReqc2eezgg+jOL/2G2w604kdJQ4uYpeCx:fAkCr73etjU2G2wyS/p
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 468 medge.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 468 medge.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: medge.exe File opened (read-only) \??\H: medge.exe File opened (read-only) \??\W: medge.exe File opened (read-only) \??\B: medge.exe File opened (read-only) \??\F: medge.exe File opened (read-only) \??\I: medge.exe File opened (read-only) \??\S: medge.exe File opened (read-only) \??\X: medge.exe File opened (read-only) \??\M: medge.exe File opened (read-only) \??\R: medge.exe File opened (read-only) \??\Z: medge.exe File opened (read-only) \??\G: medge.exe File opened (read-only) \??\J: medge.exe File opened (read-only) \??\K: medge.exe File opened (read-only) \??\L: medge.exe File opened (read-only) \??\N: medge.exe File opened (read-only) \??\O: medge.exe File opened (read-only) \??\P: medge.exe File opened (read-only) \??\Q: medge.exe File opened (read-only) \??\T: medge.exe File opened (read-only) \??\U: medge.exe File opened (read-only) \??\V: medge.exe File opened (read-only) \??\Y: medge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Silverlighte\medge.exe fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe File created C:\Program Files (x86)\Microsoft Silverlighte\nw_elf.dll fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 medge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString medge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe 468 medge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2032 wrote to memory of 468 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 29 PID 2032 wrote to memory of 468 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 29 PID 2032 wrote to memory of 468 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 29 PID 2032 wrote to memory of 468 2032 fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe"C:\Users\Admin\AppData\Local\Temp\fd734748f5d60792ac7a60c2e6924750b8bb33c420a585120c272368a7d4012b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files (x86)\Microsoft Silverlighte\medge.exe"C:\Program Files (x86)\Microsoft Silverlighte\medge.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
213KB
MD5c7fff3ae7d768e537849799b824c246f
SHA143faeeac05751f49c3059bacf5df9c9e5704c0a2
SHA2560c22a81a2292af18ee3c870406453f8072904993b06bca34e6eae75b8151fd95
SHA5122108a52e043e1aa06416a2539d8f5dd1febb9007ae91e7fdea5d8f4b96564a6fc046972c9d12f3fceb9cb0830729424c207598752fbd10273bdc4060b3a00de7
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
213KB
MD5c7fff3ae7d768e537849799b824c246f
SHA143faeeac05751f49c3059bacf5df9c9e5704c0a2
SHA2560c22a81a2292af18ee3c870406453f8072904993b06bca34e6eae75b8151fd95
SHA5122108a52e043e1aa06416a2539d8f5dd1febb9007ae91e7fdea5d8f4b96564a6fc046972c9d12f3fceb9cb0830729424c207598752fbd10273bdc4060b3a00de7