Analysis
-
max time kernel
90s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
fe049ddd0ffd2df34da564208aff9cec.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
fe049ddd0ffd2df34da564208aff9cec.exe
Resource
win10v2004-20231020-en
General
-
Target
fe049ddd0ffd2df34da564208aff9cec.exe
-
Size
1.9MB
-
MD5
fe049ddd0ffd2df34da564208aff9cec
-
SHA1
1df42bae63a1698b6070b198f9dceb3ac2b1338e
-
SHA256
aa16eed6abd2118df6b0670813ae3b9dab59b458bdc76222866c9a9fc0fa1409
-
SHA512
b46e677b3366e395a96761c768112acb01acfeacc92bc5f2749a923bcbc33e4ee6a1d9f5156cf6e250e217e79111e576f5567eae2f7eb381ffa2e08162f1ffbc
-
SSDEEP
49152:T9+v9qBhn3hRk9XkSxV4QFTNXopKJe8FtU+0:5wqBZTk9X7bFTSphIK
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2508-5-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-10-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-11-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-12-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-17-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-18-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-19-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-20-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-21-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-31-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-51-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-50-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-52-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-56-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-55-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-54-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-60-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-61-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-57-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-66-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-76-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-77-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-78-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-69-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-68-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-67-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-71-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-72-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-73-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-79-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-81-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-82-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-89-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-94-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-93-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-92-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-86-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-90-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-91-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-85-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-83-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-88-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-99-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-98-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-96-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-97-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral1/memory/2508-95-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" fe049ddd0ffd2df34da564208aff9cec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2508 fe049ddd0ffd2df34da564208aff9cec.exe 2508 fe049ddd0ffd2df34da564208aff9cec.exe 2508 fe049ddd0ffd2df34da564208aff9cec.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28 PID 2268 wrote to memory of 2508 2268 fe049ddd0ffd2df34da564208aff9cec.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5974c50c59a0c08c693cd0e89b25c611e
SHA1dfb0add696cdfb6dea30b85ce804bfb19a1cf0ff
SHA256431220f091535b808c18699fd5c9c1e0750c225b59671460d707b318e20d2099
SHA512196db0d36d3b9f6566da86239bd8f9e81e25c372edd5d8c646e576b692890b04bf25ac4438c996d8cb8c79bd091066c90ff657c051c9f530d33bb6ef6e25cad5
-
Filesize
20.1MB
MD530a77f5fc3b407ab0365d58b451cecf8
SHA14615405ccf0bd579df205430920361ae97e6b455
SHA2568e8ce8a607b2be0f71b3c169a21d607c8c54e1d76db40c42f0de5a8a47ac0354
SHA512657e52c9c558d22137d77e3d2ff4dfccf10fd8edd2812159b98db242b2729decbc026998036d5d37475aae9981e2e586d6903662ee101e06d7e9cf5f3111b665