Analysis

  • max time kernel
    179s
  • max time network
    190s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 19:31

General

  • Target

    0db03cdae71a3621719d7aa611852fa4.exe

  • Size

    297KB

  • MD5

    0db03cdae71a3621719d7aa611852fa4

  • SHA1

    30396c6baf8adec0007548068f67ad702ab5a33b

  • SHA256

    7863cec21e457f7d980d4aa6b86a396f4c77200d1ce1f3f67cbcf69b5bffaf35

  • SHA512

    6c15bcbba82fd0012eb1dc4f1df5952ab406363a9be1ec7c3ba06c8447588ba8a6a5c6c7133d2fe03a51388129eff50a519683ca68088bf1cabe2f6bdabae579

  • SSDEEP

    6144:0BVCDoKKjiAiophvutPeCAM2zJgFoajs92FtjafVi4i1O0vGMwS0dT1O:lSiAiM1uVRYd8tWw4irOb1O

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0db03cdae71a3621719d7aa611852fa4.exe
    "C:\Users\Admin\AppData\Local\Temp\0db03cdae71a3621719d7aa611852fa4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Users\Admin\AppData\Local\testserver.exe
      "C:\Users\Admin\AppData\Local\testserver.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\testserver.exe

    Filesize

    53KB

    MD5

    261287d59d1dd6d20abbb33078e99e1b

    SHA1

    b551e9f32c12fd15e17e94c97e5e98bc1c9a06ab

    SHA256

    d34006de68ed5a760b9244159d75f6defba69334817f87312fdc1c087d4d99c8

    SHA512

    865d355dc4e0d4dbb7674e78c09cb8931c8dca5fafbba4d42deba3eeff862ab5762253c656dafa1a3b89b2cca7df668c5cca4407f920bdac69f329a79683da8d

  • C:\Users\Admin\AppData\Local\testserver.exe

    Filesize

    77KB

    MD5

    cc6145fa00f317665158e9f1152e0d34

    SHA1

    904e412e4c0ebf45e317abc90f71b12d23e76958

    SHA256

    3f2040a87ec6ad7881a227fa3b25128a4524810b8f8d90fa4978a6da44f42b4d

    SHA512

    9add85b75422d1cf3faab01976f2b2ca19c1d74d12b496d7769e935d995af29c28dd1cae77d5594f76f039c1bb2c43317f13c38e377ceb1c42e59feb894fc4a3

  • \Users\Admin\AppData\Local\testserver.exe

    Filesize

    112KB

    MD5

    0a545b94d64af3f0adbd6e8bd891529f

    SHA1

    3db56416e903a60bf9b0e2b3f219be5edffeecb5

    SHA256

    e9f90548e17d418d46e8213236e0081193a7a72b2eabe51ae027e60e78287c60

    SHA512

    d923752c4878d3bcb72c8bf642830acf381423e56823e79f57bf772b82b14b1cd8dff69eedab2088bc04c551610582d23f97180608dbacb3423ad23163edae58

  • \Users\Admin\AppData\Local\testserver.exe

    Filesize

    175KB

    MD5

    2dc69b8d5c1b4056dafd5bf50a79602c

    SHA1

    abb7ed939ccb8648115c2f90844225d8eb4149b6

    SHA256

    537b13ff9b2d0b555ba39d0217957f3b3f044e9d4c2ea686eda155a226ed534f

    SHA512

    83ccecd7f9d255d70d0c115d7f1622144206cda9e30edb57ca2da193d6bab8486506e150428a0da87b1e549274c2c63fe92e42957cc4182d9875b532faa85546

  • memory/2088-10-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2088-12-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB

  • memory/2840-9-0x0000000000400000-0x0000000000450000-memory.dmp

    Filesize

    320KB