Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe
Resource
win10-20230915-en
General
-
Target
c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe
-
Size
1.6MB
-
MD5
c38bf80e164eff126e9e71af1d36c983
-
SHA1
eb8b6b52c663491a552d6c5e6ccdbcc2656882be
-
SHA256
c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706
-
SHA512
81b41a0b247f1c14c9298fdd8c63fbe38f037d593ed517d716a14bb59bcde1edf644f1d3b9b7bee323f8fc6adad8ec4fd91fcf189f16b49bf8fdf2660aa7ac77
-
SSDEEP
49152:8cbi65ykiFE7xROshqKgbPTi8fvWZJ0fQzW9Pt:8cbbykpP53gpfvG6fL1t
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2508 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2508 2660 c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe 28 PID 2660 wrote to memory of 2508 2660 c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe 28 PID 2660 wrote to memory of 2508 2660 c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe 28 PID 2660 wrote to memory of 2508 2660 c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe 28 PID 2660 wrote to memory of 2508 2660 c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe 28 PID 2660 wrote to memory of 2508 2660 c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe 28 PID 2660 wrote to memory of 2508 2660 c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe"C:\Users\Admin\AppData\Local\Temp\c741e9700c0219c53116dadd001de05eacd0a45f5f8bcd4949e34efe1e02f706.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -U -s FVQLH7JX.T0K2⤵
- Loads dropped DLL
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5608805903455fb291faf932afc7caf5e
SHA1b48e6f01723a61cd5495d1dfa3043b74d1ae9e3a
SHA256421c62bef133e85c5f28aa85c7a1516827a43ac545b198dcd553df244b8173b2
SHA512baa19dc6006afaa48b46707944f7a7ee28febe28a1c257c3d931d2ac6715586427e9d4a7af6e3d25795df6121325e7688e43f0577d9bb506e5e6e03586effff3
-
Filesize
1.4MB
MD5608805903455fb291faf932afc7caf5e
SHA1b48e6f01723a61cd5495d1dfa3043b74d1ae9e3a
SHA256421c62bef133e85c5f28aa85c7a1516827a43ac545b198dcd553df244b8173b2
SHA512baa19dc6006afaa48b46707944f7a7ee28febe28a1c257c3d931d2ac6715586427e9d4a7af6e3d25795df6121325e7688e43f0577d9bb506e5e6e03586effff3