Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
3f79a494bf65e4627d087242e3a59f82.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f79a494bf65e4627d087242e3a59f82.exe
Resource
win10v2004-20231215-en
General
-
Target
3f79a494bf65e4627d087242e3a59f82.exe
-
Size
673KB
-
MD5
3f79a494bf65e4627d087242e3a59f82
-
SHA1
9635e071f8271f28591d19961ff8e386f5397eb9
-
SHA256
5f8386775e403adaa5f52e9e36003269a1d4e8cbf11bb2a4fc396728ac74a526
-
SHA512
8db4e4b486d90493db7c0942a3ccb3592f7cd56ae8fd0b78791b2a1c5963eeedf29fc458f3de13d4f7e0dbb0527751225f27569df02f97519c9d4a4a15e8a4c9
-
SSDEEP
12288:hDAtd5nBPtggVJOgIaQRs9sH36pmMI5FOcIfccGIFU49Z1swi1yUdPn7gJ2PUZ4:O/B/JZ/z9sX6gMEk33JRX1hib97gOX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2232 sxe77FF.tmp -
Loads dropped DLL 3 IoCs
pid Process 1728 3f79a494bf65e4627d087242e3a59f82.exe 1728 3f79a494bf65e4627d087242e3a59f82.exe 1728 3f79a494bf65e4627d087242e3a59f82.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Player = "C:\\Windows\\system32\\winmedia.exe" sxe77FF.tmp -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winmedia.exe sxe77FF.tmp File opened for modification C:\Windows\SysWOW64\winmedia.exe sxe77FF.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2232 sxe77FF.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2232 1728 3f79a494bf65e4627d087242e3a59f82.exe 28 PID 1728 wrote to memory of 2232 1728 3f79a494bf65e4627d087242e3a59f82.exe 28 PID 1728 wrote to memory of 2232 1728 3f79a494bf65e4627d087242e3a59f82.exe 28 PID 1728 wrote to memory of 2232 1728 3f79a494bf65e4627d087242e3a59f82.exe 28 PID 1728 wrote to memory of 2232 1728 3f79a494bf65e4627d087242e3a59f82.exe 28 PID 1728 wrote to memory of 2232 1728 3f79a494bf65e4627d087242e3a59f82.exe 28 PID 1728 wrote to memory of 2232 1728 3f79a494bf65e4627d087242e3a59f82.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe"C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\sxe77FF.tmp"C:\Users\Admin\AppData\Local\Temp\sxe77FF.tmp"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
4.0MB
MD5e6a34fdce98096428100d97ce39f8a98
SHA1ec192501fe72a3c1af5d5a76fda6235087642941
SHA2567cc96695d0386a16759d4ff1c67892d99f91806e789b1e745cfdfe60759481de
SHA5127ae7c4b5c0999320046b3eb7140a4f470f1fff6d55012e983f00d5976f1b67091b693bedaf50b888317e82eb092e91a6d1ffc16880ad8a90f7bbca512fb34bb1