Resubmissions
12/10/2023, 09:17
231012-k9jccaae7t 711/10/2023, 09:08
231011-k4bejsfa98 311/10/2023, 09:00
231011-kydbyseg56 711/10/2023, 08:53
231011-ktflhsee35 705/10/2023, 08:00
231005-jvzv4she8t 705/10/2023, 07:52
231005-jqs7rsbd65 305/10/2023, 06:28
231005-g8clmaba26 3Analysis
-
max time kernel
1793s -
max time network
1819s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe
Resource
win10v2004-20230915-en
General
-
Target
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe
-
Size
727KB
-
MD5
3bd2bc1fb2ed7ce223505556ee150890
-
SHA1
4cfd2d4f3c8c7359164eb79cf0830480d4793f1d
-
SHA256
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37
-
SHA512
374eae32c1e803f468ed248d7828ea98b438d1377e21775beb5e0a477b593816ffa543d7dd3da94613d7e448a9d5557269f2c1b27d30726c85cf0a73f89883de
-
SSDEEP
12288:TcTn6DzlAr6n1X+R1vXAMk8Bm+r7uobOJ6+ShsoaqEkgOsS5:ATn0e6gA0w+3uVzShRag2S5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1088 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 2312 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3000 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1088 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 1088 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 2312 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 2312 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3000 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3000 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2312 1088 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 32 PID 1088 wrote to memory of 2312 1088 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 32 PID 1088 wrote to memory of 2312 1088 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 32 PID 1088 wrote to memory of 2312 1088 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 32 PID 2312 wrote to memory of 3000 2312 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 33 PID 2312 wrote to memory of 3000 2312 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 33 PID 2312 wrote to memory of 3000 2312 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 33 PID 2312 wrote to memory of 3000 2312 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 33 PID 2004 wrote to memory of 2020 2004 cmd.exe 37 PID 2004 wrote to memory of 2020 2004 cmd.exe 37 PID 2004 wrote to memory of 2020 2004 cmd.exe 37 PID 2004 wrote to memory of 1880 2004 cmd.exe 38 PID 2004 wrote to memory of 1880 2004 cmd.exe 38 PID 2004 wrote to memory of 1880 2004 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe" /retrynav 12⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe" /retrynav 23⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\netsh.exenetsh.exe winhttp show proxy2⤵PID:2020
-
-
C:\Windows\system32\netsh.exenetsh.exe winhttp show proxy2⤵PID:1880
-