Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 22:54
Static task
static1
Behavioral task
behavioral1
Sample
174907cbd0f549bfddaddc4bcebf19c4.exe
Resource
win7-20231215-en
General
-
Target
174907cbd0f549bfddaddc4bcebf19c4.exe
-
Size
877KB
-
MD5
174907cbd0f549bfddaddc4bcebf19c4
-
SHA1
0353942a8bd6af31bc0a45c3badee4768c9ff59f
-
SHA256
41b220c00cbb815060629d153618828ee94fcf90396cb1d8512b8210fdb1b942
-
SHA512
a7e825a6e629b46a30d1e3dedea8221d027524e75201aafbde859009e9fea39b0bf9394b3ef1470e6407500c47d3f8773a26461c34b4ddfbc2fa89922f929f8c
-
SSDEEP
24576:xVMLKmtvPyHu7Dytct6y9pNg4W7HM+G3bOAHCS6:jiKmHyOnUp7sVC
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2172 174907cbd0f549bfddaddc4bcebf19c4.exe 2172 174907cbd0f549bfddaddc4bcebf19c4.exe 2172 174907cbd0f549bfddaddc4bcebf19c4.exe 2172 174907cbd0f549bfddaddc4bcebf19c4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 174907cbd0f549bfddaddc4bcebf19c4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 368 wrote to memory of 2480 368 174907cbd0f549bfddaddc4bcebf19c4.exe 28 PID 368 wrote to memory of 2480 368 174907cbd0f549bfddaddc4bcebf19c4.exe 28 PID 368 wrote to memory of 2480 368 174907cbd0f549bfddaddc4bcebf19c4.exe 28 PID 368 wrote to memory of 2480 368 174907cbd0f549bfddaddc4bcebf19c4.exe 28 PID 368 wrote to memory of 2480 368 174907cbd0f549bfddaddc4bcebf19c4.exe 28 PID 368 wrote to memory of 2480 368 174907cbd0f549bfddaddc4bcebf19c4.exe 28 PID 368 wrote to memory of 2480 368 174907cbd0f549bfddaddc4bcebf19c4.exe 28 PID 2480 wrote to memory of 2172 2480 174907cbd0f549bfddaddc4bcebf19c4.exe 29 PID 2480 wrote to memory of 2172 2480 174907cbd0f549bfddaddc4bcebf19c4.exe 29 PID 2480 wrote to memory of 2172 2480 174907cbd0f549bfddaddc4bcebf19c4.exe 29 PID 2480 wrote to memory of 2172 2480 174907cbd0f549bfddaddc4bcebf19c4.exe 29 PID 2480 wrote to memory of 2172 2480 174907cbd0f549bfddaddc4bcebf19c4.exe 29 PID 2480 wrote to memory of 2172 2480 174907cbd0f549bfddaddc4bcebf19c4.exe 29 PID 2480 wrote to memory of 2172 2480 174907cbd0f549bfddaddc4bcebf19c4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"C:\Users\Admin\AppData\Local\Temp\174907cbd0f549bfddaddc4bcebf19c4.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD56bec54beaae013a45a0a490e22902001
SHA1e29a03b7126450c1f87d5629a8307c42310b7189
SHA2564bfa5ecc7cfdfaaf7bdad16d2cd227660115fe88781fd917c640840d487e5ae2
SHA512867d16a5aadb70d8696a973d459fd8455d9085270b635b573a23451be2b8b88dd7dd5f56dd6f0dc02533d72bd4e1b3239aaa382c95b9539d093415dd0a14e1ed
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD509d2815d25a449295029532d6fb6dd40
SHA12764b148dd2449107c8b5d917026e0f7a1de4995
SHA256473d5ffc62b96076fb10be3785a519b291af8ec246318f210beb569b221ab8b5
SHA51272394c1fc0c3d29a6302bfc832d6cecd1adc462dc540c97fcdfed9f7b68113177a43b0373a054f04e08ba9564bb4605bc41f9625a55dd4490010f2df678242e5