Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2023 17:34
Behavioral task
behavioral1
Sample
ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe
Resource
win10v2004-20230824-en
General
-
Target
ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe
-
Size
266KB
-
MD5
258a359e5c8cbd4e67be1a73f237387e
-
SHA1
7239111d65d7142475309d1c82da201514bad789
-
SHA256
ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b
-
SHA512
77363b272e4ea9d0d981de12449fc34c315f9e00da233221d03888c73889f8eb313c2ac6768075c5e5f738cb9593eea8174edd8da71fe29f04e63db0d9a05784
-
SSDEEP
3072:nnNXEGZJWhfNFC4S60+XoLczrVmXKoYAC2oPfZNL+C5LYZNO5McAx9LioH01ne4S:NXzKdNY49u8rVIz+Mi5Mcwx01net
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3704 ITS SB App Switch.exe 3348 ITS SB App Switch.exe -
resource yara_rule behavioral1/memory/4736-0-0x0000000000130000-0x00000000001D0000-memory.dmp upx behavioral1/memory/4736-10-0x0000000000130000-0x00000000001D0000-memory.dmp upx behavioral1/memory/4736-11-0x0000000000130000-0x00000000001D0000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3704 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 85 PID 4736 wrote to memory of 3704 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 85 PID 4736 wrote to memory of 3704 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 85 PID 4736 wrote to memory of 3348 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 86 PID 4736 wrote to memory of 3348 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 86 PID 4736 wrote to memory of 3348 4736 ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe"C:\Users\Admin\AppData\Local\Temp\ef1be5ef839824852809f3b4d349eaab1454ed0736d43a4a27e3cc02481ac46b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\ITS\wincsecb\264\Production\ITS SB App Switch.exe"C:\Users\Admin\AppData\Local\Temp\ITS\wincsecb\264\Production\ITS SB App Switch.exe"2⤵
- Executes dropped EXE
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\ITS\wincsecb\264\Production\ITS SB App Switch.exe"C:\Users\Admin\AppData\Local\Temp\ITS\wincsecb\264\Production\ITS SB App Switch.exe"2⤵
- Executes dropped EXE
PID:3348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5368332fca74f48697d842c5f4698ae1d
SHA10275153a1e62bd0eca0b02168895517ed66aac56
SHA2563a4a5b128c3a042010824fd33b719466b0d9320aa051ca3d5f1690124766ad59
SHA512fd9f1d1a4337e00fef5e9ea10a7fdf553e98df2cf2fdf818b68689a89de3c1d324de389e0c9ef863fef08a3dff8150db173b2203e9e92efaea67865e8d2805b5
-
Filesize
87KB
MD5368332fca74f48697d842c5f4698ae1d
SHA10275153a1e62bd0eca0b02168895517ed66aac56
SHA2563a4a5b128c3a042010824fd33b719466b0d9320aa051ca3d5f1690124766ad59
SHA512fd9f1d1a4337e00fef5e9ea10a7fdf553e98df2cf2fdf818b68689a89de3c1d324de389e0c9ef863fef08a3dff8150db173b2203e9e92efaea67865e8d2805b5
-
Filesize
87KB
MD5368332fca74f48697d842c5f4698ae1d
SHA10275153a1e62bd0eca0b02168895517ed66aac56
SHA2563a4a5b128c3a042010824fd33b719466b0d9320aa051ca3d5f1690124766ad59
SHA512fd9f1d1a4337e00fef5e9ea10a7fdf553e98df2cf2fdf818b68689a89de3c1d324de389e0c9ef863fef08a3dff8150db173b2203e9e92efaea67865e8d2805b5
-
Filesize
87KB
MD5368332fca74f48697d842c5f4698ae1d
SHA10275153a1e62bd0eca0b02168895517ed66aac56
SHA2563a4a5b128c3a042010824fd33b719466b0d9320aa051ca3d5f1690124766ad59
SHA512fd9f1d1a4337e00fef5e9ea10a7fdf553e98df2cf2fdf818b68689a89de3c1d324de389e0c9ef863fef08a3dff8150db173b2203e9e92efaea67865e8d2805b5