Analysis
-
max time kernel
24s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:39
Static task
static1
Behavioral task
behavioral1
Sample
117df22c3509702a54a9f97fcd27768d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
117df22c3509702a54a9f97fcd27768d.exe
Resource
win10v2004-20231222-en
General
-
Target
117df22c3509702a54a9f97fcd27768d.exe
-
Size
639KB
-
MD5
117df22c3509702a54a9f97fcd27768d
-
SHA1
a55b02758e00d26b6d9ee0966fb45362d9ee78f9
-
SHA256
19bc1945cca25fdefe121544a0e3f36e727fe2b219ec270bbf2ebfef4dc632e1
-
SHA512
c2659261b54b1aa2e23ed295c18f1d9570ee2aadaeb6c5962d7275946772737c38821f92e78298a1243ac956c817a5dcfb996d7b03761c9caaecba2263a3e7d6
-
SSDEEP
12288:7w4ub21OBjYGRaJQagcBIzZn3OEXlI/4okHd3hLH9tf0RVah:ULb2lGRFdp3+kHdldtmVah
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2984 s6638.exe -
Loads dropped DLL 4 IoCs
pid Process 952 117df22c3509702a54a9f97fcd27768d.exe 952 117df22c3509702a54a9f97fcd27768d.exe 952 117df22c3509702a54a9f97fcd27768d.exe 952 117df22c3509702a54a9f97fcd27768d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 952 wrote to memory of 2984 952 117df22c3509702a54a9f97fcd27768d.exe 28 PID 952 wrote to memory of 2984 952 117df22c3509702a54a9f97fcd27768d.exe 28 PID 952 wrote to memory of 2984 952 117df22c3509702a54a9f97fcd27768d.exe 28 PID 952 wrote to memory of 2984 952 117df22c3509702a54a9f97fcd27768d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe"C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\n6638\s6638.exe"C:\Users\Admin\AppData\Local\Temp\n6638\s6638.exe" a299da864c2a1171319ffd1emTWQTctauAIoAJqmDVVhMt0HlwnsyTuGYN6Vrz1oy0DIQ7Ojrgcac8ksaha8V1OWLQ0L6XeB4ek4aZzo9tYCYFOwus/nFN7w5KafogBQ63riZLdcn5OAwliCM+uohWMS3wHZMm1k62HYxWrtwTdrhuq7czHGlonxrs3PWw== /v "C:\Users\Admin\AppData\Local\Temp\117df22c3509702a54a9f97fcd27768d.exe" /a2⤵
- Executes dropped EXE
PID:2984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d37af0f1354e7891510429b6b743f1d4
SHA1cd569aa177fe3ea3fcf72f6772d1d917748ce892
SHA256d22d5faf3cc5f4d5f32e4918efabd6e419cbcf817106db206cc909a78e6c8d8e
SHA51258533a8ae94c6d3634b8b15354ae55fa9d924d2fd7d7d85ca6de4bec9a68c356037cf134d55fcea1df05aa008a0aadec2e463c139c19d391d4f429223bfb4848
-
Filesize
71KB
MD5a8a778569b2698c693e49d2a1d0365dd
SHA15be6d6760d5ea71286d2a2aac0d3c8223e28c02c
SHA2566baad5aaf86bf3b24282d9de2ef6082b95ee9c5d14397afc35d22b9cc470cae6
SHA512d0ea448894fb4ecb909abc0f11c72907b3f90279358b946d27ae307fcba2898d1bbf7d1a1ed50d6d687f6afa6775b84df8f70588e44d944cd3664aec8bcc1fb0
-
Filesize
351KB
MD5efbfdf1fc17841c857024c99eefe4711
SHA1368bbca1e13b869e3daa63eedf1630c0a418e472
SHA25677e44b6cf973c1b5e70889954dd449baf943d4bfa31a659fb149cf2e93ebd437
SHA5125e5306bbc20439bb73ab63c472a720c3401805e5f3b3737d461e7c8f592eec478550521e1007c5f3c24740f1afc242698d91ac68d8d686c28292a0a37185e1d5