Analysis
-
max time kernel
119s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-08-2023 10:17
Static task
static1
Behavioral task
behavioral1
Sample
L4220.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
L4220.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
L4220.exe
Resource
win10v2004-20230703-en
General
-
Target
L4220.exe
-
Size
48KB
-
MD5
5509231d1d5ed4b76e5802bcca1b5ba0
-
SHA1
3662ced6a35bdacffb9777dc02d0eed41189e4df
-
SHA256
ccd8106dadd9c6b283d98a94da817a949f5e9423be6335b616fbbefe5722b02e
-
SHA512
1ac6180da2ecc89a4c2d34d9b20830f899775cb2e0384caea8c5ad58691d182c033faa797b02294a16cbaadf2508cb511675df8a24f34bcbbd7a189d8840e218
-
SSDEEP
768:1R6ql/GrTkDnwxDzgXsJBs4lQ/HwUEjikDWXkVsFANrkNEsDDep6PxWEOZC:1RtGrTJqsENfwUEj+mrkNw6Pxx
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
L4220.exepid process 2504 L4220.exe -
Loads dropped DLL 1 IoCs
Processes:
L4220.exepid process 1972 L4220.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
L4220.exepid process 2504 L4220.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
L4220.exedescription pid process target process PID 1972 wrote to memory of 2504 1972 L4220.exe L4220.exe PID 1972 wrote to memory of 2504 1972 L4220.exe L4220.exe PID 1972 wrote to memory of 2504 1972 L4220.exe L4220.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD55509231d1d5ed4b76e5802bcca1b5ba0
SHA13662ced6a35bdacffb9777dc02d0eed41189e4df
SHA256ccd8106dadd9c6b283d98a94da817a949f5e9423be6335b616fbbefe5722b02e
SHA5121ac6180da2ecc89a4c2d34d9b20830f899775cb2e0384caea8c5ad58691d182c033faa797b02294a16cbaadf2508cb511675df8a24f34bcbbd7a189d8840e218
-
Filesize
48KB
MD55509231d1d5ed4b76e5802bcca1b5ba0
SHA13662ced6a35bdacffb9777dc02d0eed41189e4df
SHA256ccd8106dadd9c6b283d98a94da817a949f5e9423be6335b616fbbefe5722b02e
SHA5121ac6180da2ecc89a4c2d34d9b20830f899775cb2e0384caea8c5ad58691d182c033faa797b02294a16cbaadf2508cb511675df8a24f34bcbbd7a189d8840e218