Analysis
-
max time kernel
152s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 00:02
Static task
static1
Behavioral task
behavioral1
Sample
798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe
Resource
win10v2004-20230915-en
General
-
Target
798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe
-
Size
15.7MB
-
MD5
f3efe4846c05d78fc19e67e9d860f8e9
-
SHA1
840496918b38f8bdf54524cff3a4182eb9e4c7fc
-
SHA256
798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83
-
SHA512
b9db004c249a5552e76532d4f5c2b39374ed2364cad9d7d9e768b7e854050869d26f2309e933ba7ead29e434194ca96ce3d6f4167222f401165de15e8bc36dc9
-
SSDEEP
393216:BtnDLsIlJQJefdVeyit4RwUHhkcLwTeUX:BtvsIlJRf2yiCHTL0
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 536 wrote to memory of 1208 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 90 PID 536 wrote to memory of 1208 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 90 PID 536 wrote to memory of 1208 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 90 PID 536 wrote to memory of 4540 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 91 PID 536 wrote to memory of 4540 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 91 PID 536 wrote to memory of 4540 536 798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe"C:\Users\Admin\AppData\Local\Temp\798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\\*a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exe"2⤵PID:1208
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\\*.dll"2⤵PID:4540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54ec42b0f2bfe55bd0e1bddc7f9fbf7a3
SHA15068895d02f6c0237298e6aace08747cc0451634
SHA2562cffbcbe33a1cf52dc91a96753d2ab0ab692dd81cbefc288084165386a7fd62a
SHA5128accf843fb3b24b4adfdf3b50b99a394e62b47bc0d58724c0e8ed1b6d055ee631bf9801ae188c359dbdc9119fd080ec467b743f8a786ef50a0439b4160ba4f9f
-
Filesize
1KB
MD5ae7cbf8d5ee5c226b6e74b0f572450a2
SHA10365c23ed1ccaf2456bdb3b93fe243707db01ceb
SHA2561850240e8a3ee8d3d22181a52e0d5149208c2207610f95f7172ed5e325fa75a7
SHA512d14413173892c07b9bb4ff1e5acedfdf68f8f5dffb8b2f1d58a955b6f142bb009ffed2dced0fb86c429806c59c758f06548fbf961ce981370a71272e971f20cf
-
C:\Users\Admin\AppData\Local\Temp\798a10c97e9a9b949ee09e5fabb83e40ab3ab40bdb6adb7ee4bdfad668b62a83.exepack.tmp
Filesize2KB
MD5401c34fe853e58dee62b223bb9b7a1c9
SHA15d8dfa2f414cf0c9955eb7917db3aa1d209f72f2
SHA2563774d56798d7cf57e2bd733dd2de75c3b6ebb6fb555088de873727b2838de141
SHA51247668c90c507da83039ca4be6a250be6d192cf0eda04fc7232f6ab7cb4dd81ef7353f156885be2dc65512e0e082a785af87f35fb1d0304a20ce3fb27a0c8acc8