Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe
Resource
win10v2004-20230703-en
General
-
Target
ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe
-
Size
789KB
-
MD5
5bc2e7a89e09b584279c504f8884e9c8
-
SHA1
90178ec8240e332eb3c66b5a02b68fd13553ca6a
-
SHA256
ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92
-
SHA512
0b3dce05dffc0ea9dd066e7cbc320026ef83149fb5a2501d18a2d0288d01261bdc95966cdafc4bbaca932d9449c79fc46aa19164848519d3905662f829bc382b
-
SSDEEP
12288:nEExihnPg8v3/SioO0sBgWopQtgyM3ooZT1xOT6WQgpSOzK84YBn4CZL8Ko:EExynPRv3/XxK9yMTF1xQLdaYDl5o
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4308 ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Stipulerende.Tro ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Uforsvarligheden\Delimiting\Egos.ini ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\Pieceworker\Overflodssamfundenes.ini ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe File opened for modification C:\Windows\resources\Supervitality54\Harmoniseringens\Desavousbr.Che ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe File opened for modification C:\Windows\resources\Ata.Aur216 ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe File created C:\Windows\resources\Antirationalist\Adaptional\Posits.lnk ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe"C:\Users\Admin\AppData\Local\Temp\ad320f0cd9d54c0e0f86320f7f3744100a89cad81c79e7280ff42667bc56ba92.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:4308
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57ec32d1de7b60c0825d967b4a5695b95
SHA1f9ceae9b999f34594bf50521226551d32a0770a7
SHA256e78d63f8d4f6bc6f12a8148c8660f7ab4f34a7e5f19a9b0af80329185f429f03
SHA5127e8caabf7012de6657429bdc3af243226fb47b97636fc0d6f64517fcd4e335de243d09d184a97c383aa0b80e04728fc9251411bcc3701d25d5008210c5ff847f
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c