Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
0953be86f51ae54484ecf2dcf83784ac.exe
Resource
win7-20231215-en
General
-
Target
0953be86f51ae54484ecf2dcf83784ac.exe
-
Size
1.9MB
-
MD5
0953be86f51ae54484ecf2dcf83784ac
-
SHA1
0fe80cd3a290736b82c82c2eb11b9f5775c74614
-
SHA256
a421bec61c141760bf319891f0120e1484cbc047ced4d3830b216ed12d034662
-
SHA512
c3c0008dc8701367b4cb8b74b550443baddf1a8c9563b73e2d1d8814463264801c7f374db6fe8cb9a3f021a648548f891a029a1f729f499f364e4e6ea8055d33
-
SSDEEP
49152:+08pEKXcPTC7WHI1xoA7xU81kHR6gWakurxp9U:+08pEQce7Wo1X
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1912 0953be86f51ae54484ecf2dcf83784ac.exe 1912 0953be86f51ae54484ecf2dcf83784ac.exe 1912 0953be86f51ae54484ecf2dcf83784ac.exe 1912 0953be86f51ae54484ecf2dcf83784ac.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0953be86f51ae54484ecf2dcf83784ac.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2748 3052 0953be86f51ae54484ecf2dcf83784ac.exe 16 PID 3052 wrote to memory of 2748 3052 0953be86f51ae54484ecf2dcf83784ac.exe 16 PID 3052 wrote to memory of 2748 3052 0953be86f51ae54484ecf2dcf83784ac.exe 16 PID 3052 wrote to memory of 2748 3052 0953be86f51ae54484ecf2dcf83784ac.exe 16 PID 3052 wrote to memory of 2748 3052 0953be86f51ae54484ecf2dcf83784ac.exe 16 PID 3052 wrote to memory of 2748 3052 0953be86f51ae54484ecf2dcf83784ac.exe 16 PID 3052 wrote to memory of 2748 3052 0953be86f51ae54484ecf2dcf83784ac.exe 16 PID 2748 wrote to memory of 1912 2748 0953be86f51ae54484ecf2dcf83784ac.exe 17 PID 2748 wrote to memory of 1912 2748 0953be86f51ae54484ecf2dcf83784ac.exe 17 PID 2748 wrote to memory of 1912 2748 0953be86f51ae54484ecf2dcf83784ac.exe 17 PID 2748 wrote to memory of 1912 2748 0953be86f51ae54484ecf2dcf83784ac.exe 17 PID 2748 wrote to memory of 1912 2748 0953be86f51ae54484ecf2dcf83784ac.exe 17 PID 2748 wrote to memory of 1912 2748 0953be86f51ae54484ecf2dcf83784ac.exe 17 PID 2748 wrote to memory of 1912 2748 0953be86f51ae54484ecf2dcf83784ac.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\0953be86f51ae54484ecf2dcf83784ac.exe"C:\Users\Admin\AppData\Local\Temp\0953be86f51ae54484ecf2dcf83784ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\0953be86f51ae54484ecf2dcf83784ac.exe"C:\Users\Admin\AppData\Local\Temp\0953be86f51ae54484ecf2dcf83784ac.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\0953be86f51ae54484ecf2dcf83784ac.exe"C:\Users\Admin\AppData\Local\Temp\0953be86f51ae54484ecf2dcf83784ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5c9615703879a9e8aefe5149d5ee7ffaa
SHA1e9e152fcb956436d2521ea89666a60e6aa4da179
SHA256fb45356482d89288223e06d2c70107150df2a81be6351b0aa27eb3345da2ca51
SHA512636ca645291a2adac2eb92dcd7fbbb5d84d6467d1ef8f0cbdbfed04ac20c20722c0dbc17613e61ef6ef6822b2de8a6378361d2c771165ef1ff7f7d82bb0d9801
-
Filesize
200KB
MD51f7bd201509f06224923d81011d17e5f
SHA1714c8294180cddc5fa87287f26932993c6f6fed6
SHA256d372f7a2512d1a2483e36f2c4ea2bb57ce6c6c25e8c614461b668e29af057b97
SHA512b284b7ec57cdb4fe0f2e1216d3655626ab2e1e3956c084af4b177e629f20bce829afd04a9905506a7b87b550b5d0198c7d7571000beb016a713b5917645c99b3
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774