Analysis
-
max time kernel
39s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
15-11-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe
Resource
win10v2004-20231020-en
General
-
Target
en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe
-
Size
95.1MB
-
MD5
929c7d22f846f80f837e7fa14868c8f3
-
SHA1
0df49904e08c4fcd537c91c3709db74b15de2ca8
-
SHA256
cd908e832019fb106464e56bba335775e226869e79651c05ef2728dbd9774e75
-
SHA512
644ac8ba51eda8503d0a0d580e1c012c7272f7698213446b544fda9cfe602b304fdb551623d1802ec403ad3070b9e32a6dd9e31ced04b10ceba652aaed737619
-
SSDEEP
1572864:nu3tJGgWTcaZRoPvh9yrmGBGGHl9s2btsHv0BW76tNUa1+AmW9tGyrWP95Ie:gY1Qas9KNBll9s2btIv1OXoyinIe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1912 smv.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe 2000 en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1912 2000 en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe 28 PID 2000 wrote to memory of 1912 2000 en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe 28 PID 2000 wrote to memory of 1912 2000 en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe 28 PID 2000 wrote to memory of 1912 2000 en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe"C:\Users\Admin\AppData\Local\Temp\en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\smv.exe"C:\Users\Admin\AppData\Local\Temp\smv.exe" x en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.svf -br .2⤵
- Executes dropped EXE
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93.9MB
MD52dddf957abb459abf4add950636d9547
SHA1e5b1732cb6dc3d930f8a7bcfee2ed127106f8d68
SHA256a73e69477c25b3ea28bb831cc7be08bb2d829f0bcaef865704547781ce7d15c6
SHA512925c2c43fcf87e97d292e288d9204ae3c60388578b9dd34c55ea3f892eea1b17aa9aa52c3208478b5da554d65860a8e1fa20fc6c75f1df87f4296f7c0890bc22
-
Filesize
774KB
MD59d427ca64b3971a919d1ea7fb95c3cd1
SHA1ae63bceb5609e41e918c62369c07d5e0b4c53280
SHA25690eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4
SHA51258f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a
-
Filesize
774KB
MD59d427ca64b3971a919d1ea7fb95c3cd1
SHA1ae63bceb5609e41e918c62369c07d5e0b4c53280
SHA25690eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4
SHA51258f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a
-
Filesize
774KB
MD59d427ca64b3971a919d1ea7fb95c3cd1
SHA1ae63bceb5609e41e918c62369c07d5e0b4c53280
SHA25690eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4
SHA51258f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a
-
Filesize
774KB
MD59d427ca64b3971a919d1ea7fb95c3cd1
SHA1ae63bceb5609e41e918c62369c07d5e0b4c53280
SHA25690eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4
SHA51258f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a