Analysis
-
max time kernel
140s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
15cd6c90d555733c5680657b65dbbf6a.exe
Resource
win7-20231215-en
General
-
Target
15cd6c90d555733c5680657b65dbbf6a.exe
-
Size
877KB
-
MD5
15cd6c90d555733c5680657b65dbbf6a
-
SHA1
038c5f568f01e7abf2413eff150450e5a1201657
-
SHA256
24ce5ba043b8672a7c319bfb6809d9ab9a80d954a06893cd758f865dd6b76af4
-
SHA512
772f1a34f5a497453c561571597fc348e1093589e2398c12d5e445b184eb3e9baa7ac52513cb186c2638bd8da0ee10bd73127c3aca8906f122f37382a5a0ad0c
-
SSDEEP
24576:J6MLKmtvPyHu7StweGy9pNg4W7HMfG3bOAHC8G:UiKmHyOWtT4p7sIw
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 4804 15cd6c90d555733c5680657b65dbbf6a.exe 4804 15cd6c90d555733c5680657b65dbbf6a.exe 4804 15cd6c90d555733c5680657b65dbbf6a.exe 4804 15cd6c90d555733c5680657b65dbbf6a.exe 4804 15cd6c90d555733c5680657b65dbbf6a.exe 4804 15cd6c90d555733c5680657b65dbbf6a.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 15cd6c90d555733c5680657b65dbbf6a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4636 wrote to memory of 3432 4636 15cd6c90d555733c5680657b65dbbf6a.exe 88 PID 4636 wrote to memory of 3432 4636 15cd6c90d555733c5680657b65dbbf6a.exe 88 PID 4636 wrote to memory of 3432 4636 15cd6c90d555733c5680657b65dbbf6a.exe 88 PID 3432 wrote to memory of 4804 3432 15cd6c90d555733c5680657b65dbbf6a.exe 89 PID 3432 wrote to memory of 4804 3432 15cd6c90d555733c5680657b65dbbf6a.exe 89 PID 3432 wrote to memory of 4804 3432 15cd6c90d555733c5680657b65dbbf6a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD55dbff0f5700e6d294b86f3b66bbf7284
SHA1e21c966a3559cd79eaa129f4ab55332f254cb6a4
SHA256c2e795370bb488582976b3414d3240dcb6c60e561fbd72fddcc0d3e290137745
SHA5120742ae42f70fd598a4dd0cfd7b4e18c51149d69d53fab72786a6354771812257b56d08bacc3445632dba5762a46ce04b923243fdbd5928b54b49e948762af82f
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD54bed2ad051d6e8d5d555d3b3814f98a3
SHA1c96eff10f10e86f528b1588ecd6c6463a76fb930
SHA2564b5a6fa0e5feae61647fb364145403e3fe92c9dcd6a35b32830a4028cd265315
SHA512ec0f25a199c5974e10f16c0d4c7388ed16ccb8c944a7eb9a9f426fb322fa319ce9ca50e995fdb40720f064f14572340003c7c7fbd25501d40cca4ecdcb3a4833
-
Filesize
93KB
MD5e90933456227fe97b19c348a018cf0b5
SHA123517af6384f9817a6978b357b06184e2b2b0a63
SHA2560813de05b9721060fcc2d138c441f897f2d479d49020f4453e499ef26b13e29b
SHA5128776523ceabdc3aa0563ec7be009159bea9cd2f464e8aeadb5962909585d4d4d2e3218b071e315f683dc8877ff58b17aaa7977645679beb39d796eb0ef662872