Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
30/10/2023, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe
Resource
win10v2004-20231025-en
General
-
Target
2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe
-
Size
5.0MB
-
MD5
488a1f03f48c637d54b83fd2b87cf06b
-
SHA1
ac557746501f58c849fa33ba2264a774e78d027a
-
SHA256
2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9
-
SHA512
dc4b172247e895be8089a4e2ac24480130e7ce2aef27207e552dcdb9e7fa485a230532b0f7e3fa682bcc90581ca156ebd720071273b338fe5b95d367101feb3d
-
SSDEEP
98304:GrIFiRY93fvHOHCSRVQcZFoj9ghi1RebM390bYVOQgv1TPLG8ez8E:AtfVojD390bYVsv1zLlegE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 c8ctZCc3Q.exe -
Loads dropped DLL 4 IoCs
pid Process 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe -
resource yara_rule behavioral1/files/0x002e000000015c88-15.dat upx behavioral1/files/0x002e000000015c88-13.dat upx behavioral1/files/0x002e000000015c88-10.dat upx behavioral1/files/0x002e000000015c88-9.dat upx behavioral1/files/0x002e000000015c88-5.dat upx behavioral1/files/0x002e000000015c88-17.dat upx behavioral1/memory/2156-19-0x0000000000400000-0x0000000000558000-memory.dmp upx behavioral1/memory/2156-59-0x0000000000400000-0x0000000000558000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 2156 c8ctZCc3Q.exe 2156 c8ctZCc3Q.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2456 wrote to memory of 2156 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 28 PID 2456 wrote to memory of 2156 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 28 PID 2456 wrote to memory of 2156 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 28 PID 2456 wrote to memory of 2156 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 28 PID 2456 wrote to memory of 2156 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 28 PID 2456 wrote to memory of 2156 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 28 PID 2456 wrote to memory of 2156 2456 2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe 28 PID 2156 wrote to memory of 2464 2156 c8ctZCc3Q.exe 29 PID 2156 wrote to memory of 2464 2156 c8ctZCc3Q.exe 29 PID 2156 wrote to memory of 2464 2156 c8ctZCc3Q.exe 29 PID 2156 wrote to memory of 2464 2156 c8ctZCc3Q.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe"C:\Users\Admin\AppData\Local\Temp\2dc9c5ca9b25a2320edec4f0b9f41dc5fb4f1f501d10b54f64f9ef4a18c7a0c9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Public\Pictures\c8ctZCc3Q.exe"C:\Users\Public\Pictures\c8ctZCc3Q.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini3⤵PID:2464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5e39405e85e09f64ccde0f59392317dd3
SHA19c76db4b3d8c7972e7995ecfb1e3c47ee94fd14b
SHA256cfd9677e1c0e10b1507f520c4ecd40f68db78154c0d4e6563403d540f3bf829f
SHA5126733f330145b48d23c023c664090f4f240e9bbeb8368b486c8ee8682ec6a930b73275e24075648d1aa7e01db1ec7b7e259286917a006ba9af8fb7cba3439070a
-
Filesize
36KB
MD5f6bf82a293b69aa5b47d4e2de305d45a
SHA14948716616d4bbe68be2b4c5bf95350402d3f96f
SHA2566a9368cdd7b3ff9b590e206c3536569bc45c338966d0059784959f73fe6281e0
SHA512edf0f3ee60a620cf886184c1014f38d0505aac9e3703d61d7074cfb27d6922f80e570d1a3891593606a09f1296a88c8770445761c11c390a99a5341ee56478aa
-
Filesize
358KB
MD59d2486c1507e05e256d1f3797761d2e0
SHA1f4d646a2db1ea501843f17c00120af5e6e09891d
SHA2560b1ca5a2b2a699bb24c602caa5504e58d2254d41e0d2c92066c07a26a68248a9
SHA5128cd1603165e3c9f624038dbd5a4ecc990c44195bbab32b62c6ea32a6b70fd54bd094bff2c054371d909c2c48ae86c391f4e115ffd46ff76e84de30c1d8a1e6b2
-
Filesize
132KB
MD53fd5eb94b1095a7c3a34c23f0192dda0
SHA1fb1e967f25c27c68d46db90b8a5fded3b87bb993
SHA25647c0a8e4f7ad920d610c4ccbf01289712b3860ebf35c5de6b9fbdf43ffb1eca2
SHA512551f961fe1e436979d76a007e02b0609ea85bb5a7dc860d31f38e27ca613f7fcac731a238410e4170b82bdfd3d7360531c9a4f1fefbeb0af41864407a4e3cc0b
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
53KB
MD5c41973afde3bb4a456ade1849dc3b65f
SHA1a4443b3ba4d076d03b1f28a4269207e4cf070d4a
SHA256edb8705e2b99e945424472fe142325262408ca97b510fe9044adafdd8aed4f09
SHA5125a26ae4f956aeb9e5b0de8d2ee40c55ab4c77fa5434460827f386fc2b89a43db54a36b0b75f6c2fc8cf52fa7c72edd05de5b5bc846cb9610e9de692ab685af29
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110
-
Filesize
529KB
MD549d595ab380b7c7a4cd6916eeb4dfe6f
SHA1b84649fce92cc0e7a4d25599cc15ffaf312edc0b
SHA256207d856a56e97f2fdab243742f0cfcd1ba8b5814dc65b3798e54d022ce719661
SHA512d00ed0d9baae96ccbaf1262b4a4aaf4468e4ace6cebcea81e74d830bf414d9bc61068b8fb0eefa742add14aec47284f3adc11be26c8b8d66bfae4c498f2a4110