Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 14:32
Behavioral task
behavioral1
Sample
0121dc70db163365895d5e65a8846475.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0121dc70db163365895d5e65a8846475.exe
Resource
win10v2004-20231222-en
General
-
Target
0121dc70db163365895d5e65a8846475.exe
-
Size
794KB
-
MD5
0121dc70db163365895d5e65a8846475
-
SHA1
8ca1d86d0c93f2b962bada6e60c221f15ed001db
-
SHA256
507953023e4877b6aa0c41985edb39f00b83ac314aad50e8c4704e6a60d10ace
-
SHA512
d9a4f8d9c53d4f2e5bd562c01761172f2daa2fe9612496b9b3c0d74d9863898b4b6bbda94ffdd91241d25f5642185a55eaed4d0c9d9cfcc05b4ca781be1bdeb3
-
SSDEEP
24576:q9dMul4lMV7JhDy6wahS6raC5W/vbv08EqMz:iVthO6Rh3aC50bv08Eq6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3852-0-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-1-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-2-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-148-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-149-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-150-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-151-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-153-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-154-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-155-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-157-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-158-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-159-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-160-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-161-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-162-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-163-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-164-0x0000000000400000-0x0000000000588000-memory.dmp upx behavioral2/memory/3852-165-0x0000000000400000-0x0000000000588000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is240603187.log 0121dc70db163365895d5e65a8846475.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3852 0121dc70db163365895d5e65a8846475.exe 3852 0121dc70db163365895d5e65a8846475.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD51ea9e5b417811379e874ad4870d5c51a
SHA1a4bd01f828454f3619a815dbe5423b181ec4051c
SHA256f076773a6e3ae0f1cee3c69232779a1aaaf05202db472040c0c8ea4a70af173a
SHA512965c10d2aa5312602153338da873e8866d2782e0cf633befe5a552b770e08abf47a4d2e007cdef7010c212ebcb9fefea5610c41c7ed1553440eaeab7ddd72daa
-
Filesize
506B
MD5ca913240f3c5b51aa404ae23d8893a2f
SHA1052090ca9b1e0c8f96a5b75258a6dd3975cd9227
SHA2568f67635d39f2eda26c117cbc758a00766d7881d3bf6a605ec5b718c768feb7d5
SHA51259dbd423086926849ca2d2c6039f008da51435b982565c3d6536e6b944485de31a1690054a3a71350d7c516c522bfa8993150a05aabbc8f952890eb15486246a
-
Filesize
8KB
MD5e18d16e57a247fe8e0d566464963c7f5
SHA15ecc46bb1a8180cb257e3ffc5ed8b2cf9d6ba3ff
SHA256460a5c3e75e37f0fd7fd8ba70533eebc8782aae287d4d7e33cb930b218d90c88
SHA512bfcb2cb6baf7a7b99a95949c851dad1bd18c018c07385c57dd4cfae05faa01d6dd67378b5b42c9b4425abeff8b1d229f8cffcf9b18a2492c201bd7f8d8f225ba
-
Filesize
2KB
MD595b7b97f8e0008b79aa310beaa4d10a5
SHA12ef1a45473c1afc746a4b3c876c858037e63a7e0
SHA2562e38a827a2e8b8c977493a3cf2e0127d392caaf12b9d355754edde383583a57d
SHA512cce457a16f2d6962f728bd51e7c457598c26ff2600e03e8cc65e5c2223e98cd237dc6b7a5c2f5072802889e056c02ae26f9da516e8301197cfa688e14d32c6a3
-
Filesize
52KB
MD569ef507ee02acb882aec2e94c414863f
SHA14e2207f788e591b65452c1b8dc63c0ebf724b7d7
SHA25676ab7b546eba7ac52b029eb9ff4f75647c34cb174b5030f8cbd38a0a905bf012
SHA51287e48482b45fe9f805fdf598be3f189ca7fe25bd8d8fd6988729d82d1c6d1781b14d22345f32bd28308dd2ef07369e783d96b42c0dacd49b3a5bb4239c00555a
-
Filesize
4KB
MD58a166eeb3e3e2a4fed0e0330a727c378
SHA1d8bcd5d53f28bbbed593f082b912678b415c9983
SHA2568098f00c3587ded9d30ccb1ae80d907a4924da7caf7abd786f9c06e31cc10f87
SHA51279572eb6b38ff9d308f5b0109e7181da6e02a2e22d55b48ce74ba7dfe400eb14ae456cb31973290bf4c12e629252204b0f9f35995cb828f6ea886f6fe9bdf832
-
Filesize
1KB
MD5ab987eed739ee72870e8834a02453826
SHA18f58e77c51ede9facb6fa81e82fd2025019b9a97
SHA25667f5e189dde2b27cdd9ad6750c4e606fd6fc5f10770a3f001e7e4370343070c8
SHA51224198568abe1ec25802d223d26104b2e967a89e41cffed2a05b3d37fc7be1324eb10ac98f29f3282c3f0b6962f69d992c99635ec4e47bb0af5d014d1b26d79cf