Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 08:50
Static task
static1
Behavioral task
behavioral1
Sample
f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe
Resource
win10v2004-20230915-en
General
-
Target
f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe
-
Size
3.8MB
-
MD5
c28142b15499595613a482990d3ed5ea
-
SHA1
6cc4c1b0e3ccb71f48d3e5cb6920d8a3fac05cd1
-
SHA256
f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e
-
SHA512
f2bfd1d793d6dd11123cef66954329aa0fceb9ae47500b3aa8cb4a55e7cddcd31471306fcadeedfc55b6a4d6799feaf36afec45aa9cb19540e4179a14068dab4
-
SSDEEP
49152:hW32NYoVYKmsB7UYzXQRPbyV1w1xXG+I/WGC/qKOPFzGkI3RtZnNs4T3Bet25Ylj:QBATzgQVr+/GC/qJPa1x1YhvC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1508 fwSY67wn.exe -
resource yara_rule behavioral1/files/0x000d000000012271-6.dat upx behavioral1/memory/1508-7-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral1/memory/1508-45-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe 1508 fwSY67wn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 fwSY67wn.exe 1508 fwSY67wn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1508 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 28 PID 1980 wrote to memory of 1508 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 28 PID 1980 wrote to memory of 1508 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 28 PID 1980 wrote to memory of 1508 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 28 PID 1980 wrote to memory of 1508 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 28 PID 1980 wrote to memory of 1508 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 28 PID 1980 wrote to memory of 1508 1980 f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe 28 PID 1508 wrote to memory of 2668 1508 fwSY67wn.exe 29 PID 1508 wrote to memory of 2668 1508 fwSY67wn.exe 29 PID 1508 wrote to memory of 2668 1508 fwSY67wn.exe 29 PID 1508 wrote to memory of 2668 1508 fwSY67wn.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe"C:\Users\Admin\AppData\Local\Temp\f97c4cb2a7d46140bb7cd12612622aab6fe197b4ac9235080f289cbb8fd5ad1e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Public\Downloads\xZSAx8xV\fwSY67wn.exe"C:\Users\Public\Downloads\xZSAx8xV\fwSY67wn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
358KB
MD522df74ec2eff800ecfb72489d53ca234
SHA16b065ff2157457e436b24c2cad35ea650557dc3e
SHA256a3c91eaeeed3cde1389f9bcf469891d3f2b358e9ef8a76563468aa13ce8b1c85
SHA512197270dd385e5092acfe12b7bbd3015e744b379b9861fa00c8bb94af833e6d19163a2f67159e9c21e8632f5ef55fa31cdf72b81304d62a9bcd224d6d09c49689
-
Filesize
53KB
MD521f454235b118a879f1bceda32ab8b63
SHA1b2c3b47967b2b27b081ac1e49558b1b062e24292
SHA256a82af291ebfc385f822bcc84fd0fe6b31a9c7a86f38bee3e3a05528c38f70524
SHA512089023b6142444f1c2bb46acc9c991100287fca923714182c298639310ace703fae9009f94b5b2f168d7f11259342318c78a69a1bc014c877f438d93b10f0ed5
-
Filesize
132KB
MD5d44982a5ef72ca34d9faa8d983e41af9
SHA1d60a2e963f14d20dc895f3648d3eff53c4496509
SHA2564fad18c2520c6a9e06a87d682da4c58a12d3074867c322f0e6bd3948dca1f20b
SHA512e99c59a08257d9bf75e1e2f985373a3b0f38d373c85fd783ae0528a39e02165faa200c24c0fe62db6f69572f10fa00c8fdd5ae806a1819247ba674a5cba1acc3
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110