Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
3d46c4ed1007077d5e75d0f8ffe44199.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d46c4ed1007077d5e75d0f8ffe44199.exe
Resource
win10v2004-20231201-en
General
-
Target
3d46c4ed1007077d5e75d0f8ffe44199.exe
-
Size
16KB
-
MD5
3d46c4ed1007077d5e75d0f8ffe44199
-
SHA1
6c2c2d08e0a7e6a8f6238af3ad39e2a5d7b84d76
-
SHA256
f612a2e3dbdead0477781c3f2c023e8cfe370330b992883a6c685240ac2310f5
-
SHA512
7b460764a4014545b7b79ff17555fc8dc438e15ab0315b526b880be985856e4fd6ad5d52014be056ea3e9bcf0cee2ddd2d99f2b1b96a940b16d5d7515c93815b
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhYlu3hn:hDXWipuE+K3/SSHgxmlu3hn
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2936 DEM447F.exe 2456 DEM9AC9.exe 2812 DEMEFEA.exe 320 DEM4624.exe 576 DEM9BB3.exe 2376 DEMF113.exe -
Loads dropped DLL 6 IoCs
pid Process 1888 3d46c4ed1007077d5e75d0f8ffe44199.exe 2936 DEM447F.exe 2456 DEM9AC9.exe 2812 DEMEFEA.exe 320 DEM4624.exe 576 DEM9BB3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2936 1888 3d46c4ed1007077d5e75d0f8ffe44199.exe 29 PID 1888 wrote to memory of 2936 1888 3d46c4ed1007077d5e75d0f8ffe44199.exe 29 PID 1888 wrote to memory of 2936 1888 3d46c4ed1007077d5e75d0f8ffe44199.exe 29 PID 1888 wrote to memory of 2936 1888 3d46c4ed1007077d5e75d0f8ffe44199.exe 29 PID 2936 wrote to memory of 2456 2936 DEM447F.exe 33 PID 2936 wrote to memory of 2456 2936 DEM447F.exe 33 PID 2936 wrote to memory of 2456 2936 DEM447F.exe 33 PID 2936 wrote to memory of 2456 2936 DEM447F.exe 33 PID 2456 wrote to memory of 2812 2456 DEM9AC9.exe 35 PID 2456 wrote to memory of 2812 2456 DEM9AC9.exe 35 PID 2456 wrote to memory of 2812 2456 DEM9AC9.exe 35 PID 2456 wrote to memory of 2812 2456 DEM9AC9.exe 35 PID 2812 wrote to memory of 320 2812 DEMEFEA.exe 37 PID 2812 wrote to memory of 320 2812 DEMEFEA.exe 37 PID 2812 wrote to memory of 320 2812 DEMEFEA.exe 37 PID 2812 wrote to memory of 320 2812 DEMEFEA.exe 37 PID 320 wrote to memory of 576 320 DEM4624.exe 39 PID 320 wrote to memory of 576 320 DEM4624.exe 39 PID 320 wrote to memory of 576 320 DEM4624.exe 39 PID 320 wrote to memory of 576 320 DEM4624.exe 39 PID 576 wrote to memory of 2376 576 DEM9BB3.exe 41 PID 576 wrote to memory of 2376 576 DEM9BB3.exe 41 PID 576 wrote to memory of 2376 576 DEM9BB3.exe 41 PID 576 wrote to memory of 2376 576 DEM9BB3.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d46c4ed1007077d5e75d0f8ffe44199.exe"C:\Users\Admin\AppData\Local\Temp\3d46c4ed1007077d5e75d0f8ffe44199.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\DEM447F.exe"C:\Users\Admin\AppData\Local\Temp\DEM447F.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\DEM9AC9.exe"C:\Users\Admin\AppData\Local\Temp\DEM9AC9.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\DEMEFEA.exe"C:\Users\Admin\AppData\Local\Temp\DEMEFEA.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\DEM4624.exe"C:\Users\Admin\AppData\Local\Temp\DEM4624.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\DEM9BB3.exe"C:\Users\Admin\AppData\Local\Temp\DEM9BB3.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\DEMF113.exe"C:\Users\Admin\AppData\Local\Temp\DEMF113.exe"7⤵
- Executes dropped EXE
PID:2376
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD57bfd9edcb541d41549e849cfa8d561ce
SHA180af57ccf7ea409a587c1d97dc3d10855349e5ca
SHA256a388473f58f24dedf10618b9cc9ac218fc8aec3b0a0b4e26e5a47d1266cffd77
SHA512ac90ed05b05c31c277f128d3dba60e1410c5f4347491a7e8bfb861373cae3220a9c6dd275c645d44903a0fea7ce830269203d85531d88b8d6ab1c0a59616cf1a
-
Filesize
16KB
MD5dd38af2eb58915d2b985c42ec1546c55
SHA12d2c86ccb6e9381f850258134e7956313d2ff73a
SHA2561f6f9458ff313e72227fbe85737b0156659329ab7aa44a15986375662c630afa
SHA51256e2953d24923f4d4ed5094f6d22707cbbc6911890544575955a87ca370c37af9577c656513f74d1e722dcb584be130f31761320d1f35dd195cb4545a764ad34
-
Filesize
16KB
MD5526dd4ad3122cadaf35917ff9ba200ed
SHA13631c73667fc84eb68f58f80f1ff05aa81e5f912
SHA2565a9023234a5c084da5fc69f3940d3f46059c124aedc5f7b28a8491e3cd69ceba
SHA5124955e52786ac13210fa174e4cbade83de932968eb5ed477828947cf1915650bbab4f07f7bc1b8e5ca92407aec6f82cee378288c923bb636204f41a0eee551b74
-
Filesize
16KB
MD5e3c0e7b7d0e7dde25c48224ecbfa7647
SHA1af4f145cb50ec6670da219080669dba5a3ea87b6
SHA2568c0e1e2be43ae9ae008d062e0b56da46de612657001245d568b49566566226e5
SHA5125c38e5eb0d13b2ca1ca95de0d53a887f723efc973fec2aabeb2cb7f30861da8b9b6aab1254249e3bc634048aeec5be31d4bbc816387c718b8dea89e8d36f6a72
-
Filesize
16KB
MD5fe1871ec6b6713b2f3c1fd645fdbf99f
SHA18c41184dca2b2937ae5d9ae715ac1f545910cb2c
SHA256dfb9e2a7096b2f29f3912cf74c51861264020950beeac0899acc0b0f8378902b
SHA512e609c154b1f480c9fcf4e147941834ab8b090fc778cc8ef24c24b50f992ac6aeb98f4886dcc4555c2211790c137018b84da4426560adae75beb167fb588538f7
-
Filesize
16KB
MD57c1f3708957e4ac7bc6274c0c395db83
SHA100ccaec3a7597ee8479a7a2181a25fea12c29208
SHA2567c65912b0686753fefcab72f37bfd8d4809fffb2c78e87982841f245c99d70eb
SHA5128d69406d8c7a3b94f02e8a43838ead5191572bc417f371fa014f09e6d7dd0ffdef002d5387d630964a379fe47a92a762d8292fb7b899bf9b5505d9058d5c382d