Analysis
-
max time kernel
54s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2023, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
fe049ddd0ffd2df34da564208aff9cec.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
fe049ddd0ffd2df34da564208aff9cec.exe
Resource
win10v2004-20231020-en
General
-
Target
fe049ddd0ffd2df34da564208aff9cec.exe
-
Size
1.9MB
-
MD5
fe049ddd0ffd2df34da564208aff9cec
-
SHA1
1df42bae63a1698b6070b198f9dceb3ac2b1338e
-
SHA256
aa16eed6abd2118df6b0670813ae3b9dab59b458bdc76222866c9a9fc0fa1409
-
SHA512
b46e677b3366e395a96761c768112acb01acfeacc92bc5f2749a923bcbc33e4ee6a1d9f5156cf6e250e217e79111e576f5567eae2f7eb381ffa2e08162f1ffbc
-
SSDEEP
49152:T9+v9qBhn3hRk9XkSxV4QFTNXopKJe8FtU+0:5wqBZTk9X7bFTSphIK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5116-3-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-5-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-6-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-7-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-8-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-9-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-14-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-15-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-16-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-17-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-42-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-43-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-44-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-45-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-48-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-56-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-55-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-61-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-70-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-74-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-85-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-84-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-83-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-81-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-80-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-76-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-72-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-71-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-63-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-68-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-62-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-65-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-100-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-99-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-98-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-89-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-88-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-86-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-66-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-60-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-58-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-57-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-53-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-52-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-51-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-50-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-54-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-47-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral2/memory/5116-49-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" fe049ddd0ffd2df34da564208aff9cec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4128 set thread context of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5116 fe049ddd0ffd2df34da564208aff9cec.exe 5116 fe049ddd0ffd2df34da564208aff9cec.exe 5116 fe049ddd0ffd2df34da564208aff9cec.exe 5116 fe049ddd0ffd2df34da564208aff9cec.exe 5116 fe049ddd0ffd2df34da564208aff9cec.exe 5116 fe049ddd0ffd2df34da564208aff9cec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91 PID 4128 wrote to memory of 5116 4128 fe049ddd0ffd2df34da564208aff9cec.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"C:\Users\Admin\AppData\Local\Temp\fe049ddd0ffd2df34da564208aff9cec.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5974c50c59a0c08c693cd0e89b25c611e
SHA1dfb0add696cdfb6dea30b85ce804bfb19a1cf0ff
SHA256431220f091535b808c18699fd5c9c1e0750c225b59671460d707b318e20d2099
SHA512196db0d36d3b9f6566da86239bd8f9e81e25c372edd5d8c646e576b692890b04bf25ac4438c996d8cb8c79bd091066c90ff657c051c9f530d33bb6ef6e25cad5
-
Filesize
5.8MB
MD568e90b6a60316191cebeefcbf7594f86
SHA160294667c572fae26dc3907ec6441b65032d1931
SHA25626fd2f4dd393bc8c543676c77d8cdabc640b7ceb411bee6a3bcb0c3850ea95d6
SHA5121021a39d26b22233d1e04b47aec680e406bccce105be54ee55e256d03f9464d1245790239d90a5830d8d757debfe6eb1d9acbaa61de164d1f2a332750c18691e