Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 06:46
Static task
static1
Behavioral task
behavioral1
Sample
559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe
Resource
win10v2004-20230915-en
General
-
Target
559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe
-
Size
1.6MB
-
MD5
4fcbf2f3694bd01dca6e57bc2900940a
-
SHA1
fd562d99eb846ca0d75c6d7b23f0f1dc217f4e7d
-
SHA256
559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7
-
SHA512
24a3397945dc875ff7991df06a83eaeeecb3f16fbc489199e26c761ba1a21be7c864b85506385b0253fca9385f5bc2ade84a38fe423f4406fa0a712789d2d2a2
-
SSDEEP
24576:fJbBVxhKJozGQVUSh0h5HZDd1dK0W5Xrp6Op07S8BTNwhQ:fZKMGQVkpy0Urfp2S0mhQ
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2528 559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe File opened (read-only) \??\h: 559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2528 559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2528 559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe 2528 559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe"C:\Users\Admin\AppData\Local\Temp\559438c89ef18a9e62239fcef94fce3af42eea734e74385c944e54a1cb7458c7.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD59ad1f0993fa3fef25809d8ffd5b253a6
SHA1495265c695dc6cee6bb953e8867cd36ee554f5c7
SHA2562920bad2de22e1ed412fa2a481844a31f57d0accf11995e05ac1bb1fed2eb038
SHA512073167e75ff873abbfe99ef08ad1e8e7d64b2eeff83c91065e9d73245aac55bca5aa53d8fa809cfb45e879cdfa5161d5e12aa36a375d0bb0c4c11e1ee37343e2