Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
0745945b6caa86864d41738020591e6a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0745945b6caa86864d41738020591e6a.exe
Resource
win10v2004-20231215-en
General
-
Target
0745945b6caa86864d41738020591e6a.exe
-
Size
2.0MB
-
MD5
0745945b6caa86864d41738020591e6a
-
SHA1
3770b2bffefbe321fcbc03c771289f1c50e7864f
-
SHA256
cb6b4a27af5fee734b162e9912712a2a55d6a265fc94282be6cf891f0e3ad7d0
-
SHA512
1aa1405acb90c184e24ac02d42c7d7f27b4e70896b1c70621ea54d67684f7dd5058970852adf176777192102a6068bc80842119c2a6d0d4c24697e52b88600cf
-
SSDEEP
49152:o2oteZXJPE2aKP7j9e22dQrtzPB8P5GlPS9zQ7kA8k5majaBygB/q:FoIZ5PE222pt76PjlfeJjrgBC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2216 0745945b6caa86864d41738020591e6a.tmp -
Loads dropped DLL 4 IoCs
pid Process 1900 0745945b6caa86864d41738020591e6a.exe 2216 0745945b6caa86864d41738020591e6a.tmp 2216 0745945b6caa86864d41738020591e6a.tmp 2216 0745945b6caa86864d41738020591e6a.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 0745945b6caa86864d41738020591e6a.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2216 1900 0745945b6caa86864d41738020591e6a.exe 16 PID 1900 wrote to memory of 2216 1900 0745945b6caa86864d41738020591e6a.exe 16 PID 1900 wrote to memory of 2216 1900 0745945b6caa86864d41738020591e6a.exe 16 PID 1900 wrote to memory of 2216 1900 0745945b6caa86864d41738020591e6a.exe 16 PID 1900 wrote to memory of 2216 1900 0745945b6caa86864d41738020591e6a.exe 16 PID 1900 wrote to memory of 2216 1900 0745945b6caa86864d41738020591e6a.exe 16 PID 1900 wrote to memory of 2216 1900 0745945b6caa86864d41738020591e6a.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-5DRNQ.tmp\0745945b6caa86864d41738020591e6a.tmp"C:\Users\Admin\AppData\Local\Temp\is-5DRNQ.tmp\0745945b6caa86864d41738020591e6a.tmp" /SL5="$70122,1806965,72704,C:\Users\Admin\AppData\Local\Temp\0745945b6caa86864d41738020591e6a.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2216
-
C:\Users\Admin\AppData\Local\Temp\0745945b6caa86864d41738020591e6a.exe"C:\Users\Admin\AppData\Local\Temp\0745945b6caa86864d41738020591e6a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5c7ca6d178aa0e19917ed46e51e15f29e
SHA168d0ef3f226620cec454faee41a11a5aa1d0a07b
SHA256fd3f8fc63f1c166892e30a050c803be527b0c3cb7183062db088b26d56c037c8
SHA5120e5b54bb22ea863630adfda2479ce64ffa7629da5b83a2060481ecdc123702e075d316f6748e437a8ae2b4fba3abf6278daf98d37bb3c0087112104936882b08
-
Filesize
5KB
MD58d0fe087e669c90c2db1a906f5111610
SHA1590c6a5212033601dd9c1573124c474c06d2f117
SHA2564164489e22724f6fd819656441669d808a967a1f2ad544a8f5171543ebfdc44b
SHA5121007e51ffd37e3c39ef84d7bd68b26577ff4de244fb91c9e66cbc6894297ac964549372b42727009eaadc5412d329e37aaba00c31f1d4dd245e4dc82fa350cc7
-
Filesize
30KB
MD5c0c2c4b663fa56ae70d9f8076aa3d858
SHA1f431dcf6a923d0d32c4e319d3b30127800045e08
SHA2566107bc557978b39c97c0232b265039f6a64b2e18d6cea2a8739459490209e9cb
SHA512e3b22ea0178f8b49335ab98ff5e8a8aeb5ab2e77d6039942be0d68b721a2c3130fe0e623dee2da88219679d171b08e225289f57114aa57b33361693850b45584
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
11KB
MD55adb9f7660fc3c52236aed195792834a
SHA1aa8d3e4ec18fb2fc098363d880b9265b651dbb40
SHA25602e0c1aaf0a384a3436ab6abac2d556dcae2c4dc258ae2a50f592fae1f346b2c
SHA512b1ec0a8380a9332914e8e24c8b52c007bc63050ccbd58920537c4621faaff2cdfe33741c7cbe52f7c87e0d887ae1331e95f000305d3a9f19a3879a62d14ba382