Analysis
-
max time kernel
161s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
03d5ab3ea7640717b50183a9411685be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03d5ab3ea7640717b50183a9411685be.exe
Resource
win10v2004-20231215-en
General
-
Target
03d5ab3ea7640717b50183a9411685be.exe
-
Size
585KB
-
MD5
03d5ab3ea7640717b50183a9411685be
-
SHA1
1387892e669722793f26aa3ae333d8286ebb0384
-
SHA256
63ddf9aba6736bfea15bf28ebb5a911703b7ffca76cc4c9c96f7852d8e900470
-
SHA512
37359865ad6d12c38d0a84aa7062fcbc30699b70baf08ba40e9607dd14e227b6b3b557dae43c228d0d145ca2fac2bce62b84908ac39c570614e4729d4c374cc4
-
SSDEEP
12288:shNGn1EjlAjK4UJ8cCrnBz5/Ht/k6ZhE0FeJTKyTSqwO:shNGn1EaOCrh5/B20eTKy1
Malware Config
Signatures
-
Drops autorun.inf file 1 TTPs 5 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\c:\autorun.inf 03d5ab3ea7640717b50183a9411685be.exe File opened for modification \??\d:\autorun.inf 03d5ab3ea7640717b50183a9411685be.exe File opened for modification \??\e:\autorun.inf 03d5ab3ea7640717b50183a9411685be.exe File opened for modification \??\f:\autorun.inf 03d5ab3ea7640717b50183a9411685be.exe File opened for modification \??\g:\autorun.inf 03d5ab3ea7640717b50183a9411685be.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\1.exe 03d5ab3ea7640717b50183a9411685be.exe File opened for modification C:\WINDOWS\SysWOW64\1.exe 03d5ab3ea7640717b50183a9411685be.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2928 set thread context of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\1.exe 03d5ab3ea7640717b50183a9411685be.exe File opened for modification C:\Program Files\1.exe 03d5ab3ea7640717b50183a9411685be.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\1.exe 03d5ab3ea7640717b50183a9411685be.exe File opened for modification C:\WINDOWS\1.exe 03d5ab3ea7640717b50183a9411685be.exe File created C:\WINDOWS\2.exe 03d5ab3ea7640717b50183a9411685be.exe File opened for modification C:\WINDOWS\2.exe 03d5ab3ea7640717b50183a9411685be.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2928 03d5ab3ea7640717b50183a9411685be.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2928 wrote to memory of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90 PID 2928 wrote to memory of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90 PID 2928 wrote to memory of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90 PID 2928 wrote to memory of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90 PID 2928 wrote to memory of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90 PID 2928 wrote to memory of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90 PID 2928 wrote to memory of 4260 2928 03d5ab3ea7640717b50183a9411685be.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\03d5ab3ea7640717b50183a9411685be.exe"C:\Users\Admin\AppData\Local\Temp\03d5ab3ea7640717b50183a9411685be.exe"1⤵
- Drops autorun.inf file
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\03d5ab3ea7640717b50183a9411685be.exeC:\Users\Admin\AppData\Local\Temp\03d5ab3ea7640717b50183a9411685be.exe2⤵PID:4260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5db30f8a5bab2500c0a83122d19da7cdc
SHA12e093ce1badbaee523ea6f652efbea46012b1f33
SHA2567372cbfc070fd8c7febca20ece525770151ab4e90fb233b768687ad297482b9a
SHA512ac90c0bffc420e53c264ad2999c81582b22b17f606bd17841c1294abc57ac84788a9744903f65fe0050cdaeeba13bd3b55db3e5627e9d8f9252dc830c07878c4