Analysis
-
max time kernel
140s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 20:05
Behavioral task
behavioral1
Sample
d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe
Resource
win10v2004-20230220-en
General
-
Target
d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe
-
Size
754KB
-
MD5
82cb8b08d18af1c5aa5af9e05a291f57
-
SHA1
33be8be92d75e3233167e9a6d82f4354ba6593b8
-
SHA256
d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e
-
SHA512
f3191e9c80fca9b871fa3947f651d925729cac4faeeef35f911b872c2ef5a1f4961cc6ead37d07af8051301503dbaaf85d0c0dcfb1413957fa64cacc9a63c950
-
SSDEEP
12288:/ekAJuJcT5l3vILzwN8dikK3ngfZkw+nQLXbNLQHIIqvH1asguTIlk7VjCt5oNn:2kbKz3vKzH8zngxkdnMN6IHXIlk7sfY
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exedescription ioc process File created C:\Windows\ldsm.ini d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe File opened for modification C:\Windows\ldsm.ini d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exepid process 1716 d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe 1716 d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe 1716 d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe 1716 d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe 1716 d6b04ffd04ed20140a63a845d056724c245b63ceb0c32bc141fdd72c572d908e.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1716-133-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-134-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-135-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-136-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-140-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-143-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-144-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-145-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-147-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-150-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-151-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-152-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB
-
memory/1716-153-0x0000000000400000-0x0000000000644000-memory.dmpFilesize
2.3MB