Analysis
-
max time kernel
179s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 19:31
Static task
static1
Behavioral task
behavioral1
Sample
0db03cdae71a3621719d7aa611852fa4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0db03cdae71a3621719d7aa611852fa4.exe
Resource
win10v2004-20231215-en
General
-
Target
0db03cdae71a3621719d7aa611852fa4.exe
-
Size
297KB
-
MD5
0db03cdae71a3621719d7aa611852fa4
-
SHA1
30396c6baf8adec0007548068f67ad702ab5a33b
-
SHA256
7863cec21e457f7d980d4aa6b86a396f4c77200d1ce1f3f67cbcf69b5bffaf35
-
SHA512
6c15bcbba82fd0012eb1dc4f1df5952ab406363a9be1ec7c3ba06c8447588ba8a6a5c6c7133d2fe03a51388129eff50a519683ca68088bf1cabe2f6bdabae579
-
SSDEEP
6144:0BVCDoKKjiAiophvutPeCAM2zJgFoajs92FtjafVi4i1O0vGMwS0dT1O:lSiAiM1uVRYd8tWw4irOb1O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2088 testserver.exe -
Loads dropped DLL 2 IoCs
pid Process 2840 0db03cdae71a3621719d7aa611852fa4.exe 2840 0db03cdae71a3621719d7aa611852fa4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\testserver.exe = "C:\\Users\\Admin\\AppData\\Local\\testserver.exe" testserver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2088 2840 0db03cdae71a3621719d7aa611852fa4.exe 29 PID 2840 wrote to memory of 2088 2840 0db03cdae71a3621719d7aa611852fa4.exe 29 PID 2840 wrote to memory of 2088 2840 0db03cdae71a3621719d7aa611852fa4.exe 29 PID 2840 wrote to memory of 2088 2840 0db03cdae71a3621719d7aa611852fa4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0db03cdae71a3621719d7aa611852fa4.exe"C:\Users\Admin\AppData\Local\Temp\0db03cdae71a3621719d7aa611852fa4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\testserver.exe"C:\Users\Admin\AppData\Local\testserver.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5261287d59d1dd6d20abbb33078e99e1b
SHA1b551e9f32c12fd15e17e94c97e5e98bc1c9a06ab
SHA256d34006de68ed5a760b9244159d75f6defba69334817f87312fdc1c087d4d99c8
SHA512865d355dc4e0d4dbb7674e78c09cb8931c8dca5fafbba4d42deba3eeff862ab5762253c656dafa1a3b89b2cca7df668c5cca4407f920bdac69f329a79683da8d
-
Filesize
77KB
MD5cc6145fa00f317665158e9f1152e0d34
SHA1904e412e4c0ebf45e317abc90f71b12d23e76958
SHA2563f2040a87ec6ad7881a227fa3b25128a4524810b8f8d90fa4978a6da44f42b4d
SHA5129add85b75422d1cf3faab01976f2b2ca19c1d74d12b496d7769e935d995af29c28dd1cae77d5594f76f039c1bb2c43317f13c38e377ceb1c42e59feb894fc4a3
-
Filesize
112KB
MD50a545b94d64af3f0adbd6e8bd891529f
SHA13db56416e903a60bf9b0e2b3f219be5edffeecb5
SHA256e9f90548e17d418d46e8213236e0081193a7a72b2eabe51ae027e60e78287c60
SHA512d923752c4878d3bcb72c8bf642830acf381423e56823e79f57bf772b82b14b1cd8dff69eedab2088bc04c551610582d23f97180608dbacb3423ad23163edae58
-
Filesize
175KB
MD52dc69b8d5c1b4056dafd5bf50a79602c
SHA1abb7ed939ccb8648115c2f90844225d8eb4149b6
SHA256537b13ff9b2d0b555ba39d0217957f3b3f044e9d4c2ea686eda155a226ed534f
SHA51283ccecd7f9d255d70d0c115d7f1622144206cda9e30edb57ca2da193d6bab8486506e150428a0da87b1e549274c2c63fe92e42957cc4182d9875b532faa85546