Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe
Resource
win10v2004-20230915-en
General
-
Target
d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe
-
Size
4.8MB
-
MD5
50e2b4da1e5c8bfa605a9430afb17831
-
SHA1
0fe3030d0b9b8905d102951f22dca196f5f8a65e
-
SHA256
d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49
-
SHA512
a2b50241bf237cc286aa05f975805cd7f849720266ac6a265523ab4e425761b4423cc0819d78bbbee57107608ebfa9a06578d371714afaebb75b423b746677aa
-
SSDEEP
98304:uuTknSMXcTwCFmgcwOhOJ3idIR9/oj9ghi1RebM390bYVGPk6AFCK6MP1e62mqCp:RMXcK4H/ojD390bYVGPk6JK6Mg65rvb5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1616 Oxt8aOT.exe -
Loads dropped DLL 4 IoCs
pid Process 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe -
resource yara_rule behavioral1/files/0x001100000001868f-5.dat upx behavioral1/files/0x001100000001868f-9.dat upx behavioral1/files/0x001100000001868f-10.dat upx behavioral1/files/0x001100000001868f-13.dat upx behavioral1/files/0x001100000001868f-15.dat upx behavioral1/files/0x001100000001868f-17.dat upx behavioral1/memory/1616-18-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral1/memory/1616-59-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 1616 Oxt8aOT.exe 1616 Oxt8aOT.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 812 wrote to memory of 1616 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 28 PID 812 wrote to memory of 1616 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 28 PID 812 wrote to memory of 1616 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 28 PID 812 wrote to memory of 1616 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 28 PID 812 wrote to memory of 1616 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 28 PID 812 wrote to memory of 1616 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 28 PID 812 wrote to memory of 1616 812 d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe 28 PID 1616 wrote to memory of 2988 1616 Oxt8aOT.exe 29 PID 1616 wrote to memory of 2988 1616 Oxt8aOT.exe 29 PID 1616 wrote to memory of 2988 1616 Oxt8aOT.exe 29 PID 1616 wrote to memory of 2988 1616 Oxt8aOT.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe"C:\Users\Admin\AppData\Local\Temp\d85933abc3f925d424c445f6a31298f19d754e8f00f98bcd5130f887ee8a2f49.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Public\Videos\Oxt8aOT.exe"C:\Users\Public\Videos\Oxt8aOT.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:2988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
358KB
MD51c3eb40185be89b621a0ef91bde75c49
SHA13b799c983725212140363dc02be8eadc9471e099
SHA25644953fe8dd58f8a555b0a5b69ae6f52a379ad3ee376959ba383d5c53c2b71d30
SHA51269564b78b13e594a13eee1500e8cc76d2d685fba5dcf312a59e95d3694dfcae63a0145801be011250a3cf941a4895790c57601aaab0246f7c043a1365b477525
-
Filesize
132KB
MD5220898362d157d42fa15b4e002327398
SHA1d8b23044a03ba4d1ca3fe493ed910154833b28e2
SHA2562f3dbb1779ff11ea887f57a38fab23593fc707319eefb3df90abfdf8131f5e77
SHA512432fcbd36c3b220258bc2c2a7086f5f6c8da8896db69316fa50f0046601182c33b7edb6e3f6ab80905034cb39021ac3ba094a63d90b00aa3ddc0dd4186192e0f
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
53KB
MD503eff03dfecb7fb609f476b0eeb7d6eb
SHA1005b562d230ceca0a9342ae559706066c57a900b
SHA256cbec966002a6c8dbd2eb972ed517aeb86af6b06df64cd55c6b0da40583ad53fb
SHA512b66049b1fb69885f685457aefb296c3c1ab36daa725b59a8de80b7c2eae00e7b9957ea03ee5f64c9f8ad46941217abb0137c9c4d77b2b91b68dbf31199a4c88f
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110