Analysis
-
max time kernel
21s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe
Resource
win10v2004-20231215-en
General
-
Target
c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe
-
Size
110KB
-
MD5
4f5d942e216097d2a0ef4e94a0f8b07b
-
SHA1
b2a27bdc7b8502e98c134b3ce3afd35718777d2f
-
SHA256
c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764
-
SHA512
e69450175d2b8e72de5f4153259468c860a0a8e1fc79d653a1dd5f4cfafa042876f9a507da3ce57cb88429db51ee9a1ce8c97ad5e414e3df4c7603c3537a4f1a
-
SSDEEP
1536:pxzBSRq0RLOFbufM/Kjz3xGNqj8t97WHS5:QsLVCpGNqotVWHS5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 836 LANjgx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1416 wrote to memory of 836 1416 c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe 19 PID 1416 wrote to memory of 836 1416 c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe 19 PID 1416 wrote to memory of 836 1416 c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe"C:\Users\Admin\AppData\Local\Temp\c125695b799ca0a4f302fcb6f2281a75cadff6ff1f8e3925f82a870f42fb3764.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\LANjgx.exeC:\LANjgx.exe2⤵
- Executes dropped EXE
PID:836 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe" C:\XjPUgs.exe3⤵PID:4824
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD575ae5881683cda5fc136e3148f7766fe
SHA1256db7a370fb75f064186415c6dc31f7b97ff868
SHA256c0b1ff29cefd8e1d704dd30e443175e9ec81eed03a2e7573a8b1fbf2a8a686a3
SHA5120a01dda1be938c9ff409be46b3f90c3c6b1eafc213b8ffd02676a06338c5a0f86cb8738c7ea83f90df27eee8b109d17511725d8d6d7303ab178f5b28e2076777
-
Filesize
23KB
MD5670d735596aff264163e01ac80a09753
SHA157f43e292acce52e17c30a3dcb60df80aa7578cc
SHA2569c2b959b98a7b873832ff7d48855f44e9e14698dad3dd4b5792733aac6d1e079
SHA512f777e731a5d65f8e5fe0225a77afdc15ba5327cc96bdd2befb503929d942d616256262c0644bdb7b202310261717889dfc3deb422a977cd30a8ae5251e2e2316