Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:45
Behavioral task
behavioral1
Sample
01fe633effbb27f1ee20bdf39e2a4477.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01fe633effbb27f1ee20bdf39e2a4477.exe
Resource
win10v2004-20231222-en
General
-
Target
01fe633effbb27f1ee20bdf39e2a4477.exe
-
Size
12KB
-
MD5
01fe633effbb27f1ee20bdf39e2a4477
-
SHA1
80a4f907a5928b40481b1a53b1f09c8988ddc698
-
SHA256
3ffa785604ef7d3c995d884927a3cf3560f8c706ccf1320b195d5840557a391e
-
SHA512
d26b4c1094befea16a4b736f7974d4a0cfa524cb1336be84f3227e94662b17ed50b90412c3ecc9692b44410f023cfd6199dafae987e78294ceb6634ca5afeeb8
-
SSDEEP
192:nmzyHCZIVxZAIou5lxfQKyaNsqh44spRK52OG4dU5BCyiptmBKpKz:NHCZuxjo2SjksqW4sHK5FGuU/CyiHSGK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2532 setup.exe -
resource yara_rule behavioral1/memory/2140-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2140-4-0x0000000001E10000-0x0000000001E1E000-memory.dmp upx behavioral1/memory/2532-9-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x000d000000012251-8.dat upx behavioral1/memory/2140-7-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2532-13-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\logger = "\"C:\\windows\\setup.exe\"" setup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\setup.exe 01fe633effbb27f1ee20bdf39e2a4477.exe File opened for modification \??\c:\windows\setup.exe 01fe633effbb27f1ee20bdf39e2a4477.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2532 2140 01fe633effbb27f1ee20bdf39e2a4477.exe 28 PID 2140 wrote to memory of 2532 2140 01fe633effbb27f1ee20bdf39e2a4477.exe 28 PID 2140 wrote to memory of 2532 2140 01fe633effbb27f1ee20bdf39e2a4477.exe 28 PID 2140 wrote to memory of 2532 2140 01fe633effbb27f1ee20bdf39e2a4477.exe 28 PID 2140 wrote to memory of 2532 2140 01fe633effbb27f1ee20bdf39e2a4477.exe 28 PID 2140 wrote to memory of 2532 2140 01fe633effbb27f1ee20bdf39e2a4477.exe 28 PID 2140 wrote to memory of 2532 2140 01fe633effbb27f1ee20bdf39e2a4477.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\01fe633effbb27f1ee20bdf39e2a4477.exe"C:\Users\Admin\AppData\Local\Temp\01fe633effbb27f1ee20bdf39e2a4477.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\windows\setup.exe"C:\windows\setup.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2532
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD501fe633effbb27f1ee20bdf39e2a4477
SHA180a4f907a5928b40481b1a53b1f09c8988ddc698
SHA2563ffa785604ef7d3c995d884927a3cf3560f8c706ccf1320b195d5840557a391e
SHA512d26b4c1094befea16a4b736f7974d4a0cfa524cb1336be84f3227e94662b17ed50b90412c3ecc9692b44410f023cfd6199dafae987e78294ceb6634ca5afeeb8