Analysis
-
max time kernel
28s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/05/2023, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe
Resource
win10v2004-20230220-en
General
-
Target
ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe
-
Size
4.7MB
-
MD5
67e462f67b3b79c83169f0ac37d09d8b
-
SHA1
8179374ad895d4fe539a922f170b65861c13d8f7
-
SHA256
ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87
-
SHA512
15b9a68818f6d166c32c81736958a3878bb2bdbbe6bb6fecc433939808a1c547cfc9a7dfe1861c96dd3c0c0853e0a6fe88b82080b1ba204c03617b36edc48b50
-
SSDEEP
98304:3Q/7x9nPi7fijP5gRWNFUjrqu5kHYOhF/QR04kdJQ4uYpeCxIR:g/7xE2F65JOhF/QrS/piR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1876 medge.exe -
Loads dropped DLL 2 IoCs
pid Process 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1876 medge.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: medge.exe File opened (read-only) \??\Q: medge.exe File opened (read-only) \??\R: medge.exe File opened (read-only) \??\T: medge.exe File opened (read-only) \??\W: medge.exe File opened (read-only) \??\E: medge.exe File opened (read-only) \??\G: medge.exe File opened (read-only) \??\I: medge.exe File opened (read-only) \??\O: medge.exe File opened (read-only) \??\X: medge.exe File opened (read-only) \??\Y: medge.exe File opened (read-only) \??\B: medge.exe File opened (read-only) \??\F: medge.exe File opened (read-only) \??\S: medge.exe File opened (read-only) \??\U: medge.exe File opened (read-only) \??\V: medge.exe File opened (read-only) \??\Z: medge.exe File opened (read-only) \??\H: medge.exe File opened (read-only) \??\J: medge.exe File opened (read-only) \??\K: medge.exe File opened (read-only) \??\L: medge.exe File opened (read-only) \??\M: medge.exe File opened (read-only) \??\P: medge.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Silverlighte\medge.exe ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe File created C:\Program Files (x86)\Microsoft Silverlighte\nw_elf.dll ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 medge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString medge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe 1876 medge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1876 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 28 PID 1228 wrote to memory of 1876 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 28 PID 1228 wrote to memory of 1876 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 28 PID 1228 wrote to memory of 1876 1228 ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe"C:\Users\Admin\AppData\Local\Temp\ad270337b64c47ab43b6af0dbf1532280d0897e9dbdbf285b830565a2b9a2e87.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Microsoft Silverlighte\medge.exe"C:\Program Files (x86)\Microsoft Silverlighte\medge.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
213KB
MD5c7fff3ae7d768e537849799b824c246f
SHA143faeeac05751f49c3059bacf5df9c9e5704c0a2
SHA2560c22a81a2292af18ee3c870406453f8072904993b06bca34e6eae75b8151fd95
SHA5122108a52e043e1aa06416a2539d8f5dd1febb9007ae91e7fdea5d8f4b96564a6fc046972c9d12f3fceb9cb0830729424c207598752fbd10273bdc4060b3a00de7
-
Filesize
2.8MB
MD55b43be674538a780d6192bbabcd51efb
SHA133e1839922bd22e6453c74de2eee1b9313ce8aff
SHA25690ba7d6f09f6db0dcf472472184d8b660f555eb85453c75ea6eefe91db817827
SHA512ea15fa5100dcc58c888f2386ef56a7586e6a577fdb12c1eb8859479527321eafdf1090d9252e2c34a5f7ae6a995a67e470abd23d323415e4e2a8a8bd0adb8328
-
Filesize
213KB
MD5c7fff3ae7d768e537849799b824c246f
SHA143faeeac05751f49c3059bacf5df9c9e5704c0a2
SHA2560c22a81a2292af18ee3c870406453f8072904993b06bca34e6eae75b8151fd95
SHA5122108a52e043e1aa06416a2539d8f5dd1febb9007ae91e7fdea5d8f4b96564a6fc046972c9d12f3fceb9cb0830729424c207598752fbd10273bdc4060b3a00de7