Analysis
-
max time kernel
0s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 18:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0cb1250d6b980b4688a792997572c2d0.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cb1250d6b980b4688a792997572c2d0.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0cb1250d6b980b4688a792997572c2d0.exe
-
Size
276KB
-
MD5
0cb1250d6b980b4688a792997572c2d0
-
SHA1
b7b7e6dd5c398879675b1a53462cde5bcd62c4db
-
SHA256
148ae2d6301585e439b30117a6de1c59c5c6277f696fa5ab8483240cc0e13235
-
SHA512
92d4a4988e40477896d27ca1accd8d933eeec593d9334793ed042b52ea9f2e497ac1d9f247c7e081ed056ebc70b17adf44314f20a343339ddbbed4cb53da360a
-
SSDEEP
6144:9saocyLCtcZ3oxaJ2ZAazVHN/VE6ACAAph5OZ:9tobXoxakJVt/aLAX
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4580 installer.exe -
Loads dropped DLL 1 IoCs
pid Process 3744 0cb1250d6b980b4688a792997572c2d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3744 wrote to memory of 4580 3744 0cb1250d6b980b4688a792997572c2d0.exe 18 PID 3744 wrote to memory of 4580 3744 0cb1250d6b980b4688a792997572c2d0.exe 18 PID 3744 wrote to memory of 4580 3744 0cb1250d6b980b4688a792997572c2d0.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cb1250d6b980b4688a792997572c2d0.exe"C:\Users\Admin\AppData\Local\Temp\0cb1250d6b980b4688a792997572c2d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\nsd4289.tmp\installer.exeC:\Users\Admin\AppData\Local\Temp\nsd4289.tmp\installer.exe e176d94e-d9b7-11e2-a752-00259033c1da.exe /t102e1e7c87417a53800fb32277c8ac /dT131950047S102e1e7c87417a53800fb32277c8ac /e9041377 /ue176d94e-d9b7-11e2-a752-00259033c1da2⤵
- Executes dropped EXE
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\nsd4289.tmp\e176d94e-d9b7-11e2-a752-00259033c1da.exe"C:\Users\Admin\AppData\Local\Temp\nsd4289.tmp\e176d94e-d9b7-11e2-a752-00259033c1da.exe" /t102e1e7c87417a53800fb32277c8ac /dT131950047S102e1e7c87417a53800fb32277c8ac /e9041377 /ue176d94e-d9b7-11e2-a752-00259033c1da3⤵PID:2828
-
-