Analysis
-
max time kernel
212s -
max time network
235s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe
Resource
win10v2004-20230915-en
General
-
Target
dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe
-
Size
7.9MB
-
MD5
c8b1d502bae993d0d5d93f5a049a4b75
-
SHA1
ed697664ad05a1dc4011f18f83d06326ce55a002
-
SHA256
dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19
-
SHA512
9d15dea683038c0518c0748c60a4d72158558621889deb4d323c79aced17cca893360af0424abd94078229004bc552182ee4a7c8b49767e3710644b49e048134
-
SSDEEP
196608:5DSbUJ1bwVwYBR7v6wV+3FaKXngbHGsWMXCJgTtwrAk+L:5TwVwYBxHcVRXgbEMIgTt2M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4688 wrote to memory of 1972 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 87 PID 4688 wrote to memory of 1972 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 87 PID 4688 wrote to memory of 1972 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 87 PID 4688 wrote to memory of 2528 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 88 PID 4688 wrote to memory of 2528 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 88 PID 4688 wrote to memory of 2528 4688 dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe"C:\Users\Admin\AppData\Local\Temp\dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*0049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exe"2⤵PID:1972
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\*.dll"2⤵PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e70f2bd9db1bfbc209d9eec4cd59b553
SHA134be2b40db4eb055b276436b778d61d6ba7d5fef
SHA256daf0a4a2deb32d5a3f81c9ccafbb79a4d2e3938f72af919557802dba903128d1
SHA512790b0a9cdf35713fdbfa5b94bd5d7bfc1ded39a8bed73acc9511e89d956a48901161bacac9970c3337e02c2b1f82587559a451afb19998682ac3c790c7a584d2
-
Filesize
1KB
MD5354de0bec2ea26d754b834aad35f09ae
SHA182ec64f512153baa1ee314d8494f9def2b16bed2
SHA2562eae3b767fe1c00c70a49f07ea1160ee8b679fbe4c300292f49ab284fc8c25f1
SHA5127e0b1152f1afcfd828eb9da9937f6daea5512f6a05e88809a14037f13e68dcee1b62e13392868f3f11706e159570b44afbd30f94c799aeb82cab962ef4129f9d
-
C:\Users\Admin\AppData\Local\Temp\dc00049659395111a4e018ccb6f0890b8ec77f42d6de7b573652cae7c2ef5f19.exepack.tmp
Filesize2KB
MD585e64a776bac67f60153f0d73da9b19f
SHA1db0e1abece6410f08435bd6404ad3158e4ef03d8
SHA25625c7542111347e9f6e8c7b72e9174edf11d7446eaa1cb258c5b8638e6c8fe4f6
SHA512d98d70e220481117d848b0efb690515c79dcfca6b88121f2e36285b2a7968ebc1b6021466ced3770d366b3beb734600378e76a6b62b75f193a7e1d08ac4c3305