Analysis
-
max time kernel
158s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 08:17
Behavioral task
behavioral1
Sample
c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe
Resource
win10v2004-20230915-en
General
-
Target
c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe
-
Size
15.8MB
-
MD5
f57b2435054bac4e30faf8f5b051f2b4
-
SHA1
22e21381f88025192ef91076ddf00f8721f04ef6
-
SHA256
c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba
-
SHA512
113f852b541503454e4e3acdcf8fa9bb391cae9a27308d9f23525c70a883082b012965c0e79752e26365200dbbe0ec8d4a111f5eb81284b885cfd6a1d7c3639e
-
SSDEEP
393216:UsecyNB/wmOZISw9PORqFw940bkHhcwFMqorhzFVw:UsecgB/wmofwpFwH+mwJoNzo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1084 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe -
resource yara_rule behavioral2/memory/1704-0-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1704-1-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1704-2-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1704-3-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1704-4-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/files/0x000100000000002b-10.dat upx behavioral2/files/0x000100000000002b-9.dat upx behavioral2/memory/1084-13-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1704-15-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-17-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-18-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-19-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-20-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-23-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-25-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-26-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-27-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-28-0x0000000000400000-0x0000000001C28000-memory.dmp upx behavioral2/memory/1084-30-0x0000000000400000-0x0000000001C28000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\T: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\F: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\N: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\B: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\G: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\H: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\I: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\M: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\O: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\P: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\A: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\R: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\W: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\Y: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\Q: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\K: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\L: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\X: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\Z: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\J: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\U: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\V: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe File opened (read-only) \??\E: c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1084 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1084 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1084 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1084 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 1084 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1084 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 90 PID 1704 wrote to memory of 1084 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 90 PID 1704 wrote to memory of 1084 1704 c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe"C:\Users\Admin\AppData\Local\Temp\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
F:\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exeF:\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:1084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD5f7b8e466e1ef5c67411868cca85782d5
SHA1868f833cd0cabd8d1710dee180e993367c418603
SHA25620f01f2806d8cab770837014876125cec8dac7326dfef312b68130187e06a4ca
SHA512e498d163a0d4882175e66b9705b6cbfdbd1071cc7a59f1e06b0c1be750dcd178d3d4863dfd08038dfb7b41f6947229f0044ff1ebddbeb79e02e9b8cda4c3bfb8
-
F:\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe
Filesize15.8MB
MD5f57b2435054bac4e30faf8f5b051f2b4
SHA122e21381f88025192ef91076ddf00f8721f04ef6
SHA256c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba
SHA512113f852b541503454e4e3acdcf8fa9bb391cae9a27308d9f23525c70a883082b012965c0e79752e26365200dbbe0ec8d4a111f5eb81284b885cfd6a1d7c3639e
-
F:\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba\c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba.exe
Filesize15.8MB
MD5f57b2435054bac4e30faf8f5b051f2b4
SHA122e21381f88025192ef91076ddf00f8721f04ef6
SHA256c5bc372e4109861a109ab49cbba4a572972c004b6e06222be98db52fe7dbacba
SHA512113f852b541503454e4e3acdcf8fa9bb391cae9a27308d9f23525c70a883082b012965c0e79752e26365200dbbe0ec8d4a111f5eb81284b885cfd6a1d7c3639e