Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe
Resource
win10v2004-20230703-en
General
-
Target
fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe
-
Size
153KB
-
MD5
0fa4f31473f6497da9759c52d56f2e9d
-
SHA1
5b603f74b9dd2657ae77a3472e5024867a5068df
-
SHA256
fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176
-
SHA512
40caf1ef4f825e5f748931b9b9a7c6c43f39e7f05aa8284526ad78cd4159466c5f2536ded2be1b22393f53534d23d05d9550c606eec20d5e8ed97d212160561a
-
SSDEEP
1536:o/T2X/jN2vxZz0DTHUpouvTzPP5yCyo14uGkeQwHF++IYwqmIy0xE+1oPsp:obG7N2kDTHUpouvX3QgCXTy0Pcu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1932 Un_A.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 Un_A.exe 1932 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1932 1396 fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe 83 PID 1396 wrote to memory of 1932 1396 fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe 83 PID 1396 wrote to memory of 1932 1396 fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe"C:\Users\Admin\AppData\Local\Temp\fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD568b287f4067ba013e34a1339afdb1ea8
SHA145ad585b3cc8e5a6af7b68f5d8269c97992130b3
SHA25618e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
SHA51206c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
Filesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
Filesize
153KB
MD50fa4f31473f6497da9759c52d56f2e9d
SHA15b603f74b9dd2657ae77a3472e5024867a5068df
SHA256fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176
SHA51240caf1ef4f825e5f748931b9b9a7c6c43f39e7f05aa8284526ad78cd4159466c5f2536ded2be1b22393f53534d23d05d9550c606eec20d5e8ed97d212160561a
-
Filesize
153KB
MD50fa4f31473f6497da9759c52d56f2e9d
SHA15b603f74b9dd2657ae77a3472e5024867a5068df
SHA256fca719dfc7e8e3726b537f4a6a26cf468809ed4d046280008c81b1db47e3a176
SHA51240caf1ef4f825e5f748931b9b9a7c6c43f39e7f05aa8284526ad78cd4159466c5f2536ded2be1b22393f53534d23d05d9550c606eec20d5e8ed97d212160561a