Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 22:16
Static task
static1
Behavioral task
behavioral1
Sample
3f79a494bf65e4627d087242e3a59f82.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f79a494bf65e4627d087242e3a59f82.exe
Resource
win10v2004-20231215-en
General
-
Target
3f79a494bf65e4627d087242e3a59f82.exe
-
Size
673KB
-
MD5
3f79a494bf65e4627d087242e3a59f82
-
SHA1
9635e071f8271f28591d19961ff8e386f5397eb9
-
SHA256
5f8386775e403adaa5f52e9e36003269a1d4e8cbf11bb2a4fc396728ac74a526
-
SHA512
8db4e4b486d90493db7c0942a3ccb3592f7cd56ae8fd0b78791b2a1c5963eeedf29fc458f3de13d4f7e0dbb0527751225f27569df02f97519c9d4a4a15e8a4c9
-
SSDEEP
12288:hDAtd5nBPtggVJOgIaQRs9sH36pmMI5FOcIfccGIFU49Z1swi1yUdPn7gJ2PUZ4:O/B/JZ/z9sX6gMEk33JRX1hib97gOX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1576 sxe47AA.tmp -
Loads dropped DLL 2 IoCs
pid Process 4612 3f79a494bf65e4627d087242e3a59f82.exe 4612 3f79a494bf65e4627d087242e3a59f82.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Player = "C:\\Windows\\system32\\winmedia.exe" sxe47AA.tmp -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winmedia.exe sxe47AA.tmp File opened for modification C:\Windows\SysWOW64\winmedia.exe sxe47AA.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1576 sxe47AA.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4612 wrote to memory of 1576 4612 3f79a494bf65e4627d087242e3a59f82.exe 89 PID 4612 wrote to memory of 1576 4612 3f79a494bf65e4627d087242e3a59f82.exe 89 PID 4612 wrote to memory of 1576 4612 3f79a494bf65e4627d087242e3a59f82.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe"C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\sxe47AA.tmp"C:\Users\Admin\AppData\Local\Temp\sxe47AA.tmp"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
PID:1576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5bd815b61f9948f93aface4033fbb4423
SHA1b5391484009b39053fc8b1bba63d444969bafcfa
SHA256b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76
SHA512a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71
-
Filesize
1.0MB
MD5387e2eb68052006c10e971bef5cb6a98
SHA1e85eab33895e12fcbc89fd6307652f3f33db4369
SHA2560e5e06a77430438d9f21a68303e26c676ff58211124963ba7b5acfea8db9445a
SHA512fbc3f2be09db4c0946f60c61c7e3747eb499bfa08ea16e3a1265e3760f95335d5870c56a198a71eb798aca06106a8880f47e51ffcf57d7308295825fe82681fc
-
Filesize
1024KB
MD5dc7a2d64ef36bf8dca4fc49b4295a656
SHA1e8215e8e131f43e7ebcf61fcdaa0f8939708c36c
SHA2569367362a6791f2676c334cd7a4101c097bf96f96714edfdbf95ece4e95854303
SHA512354e8930308832843f2915a2750c5e6db199a4b8ec1ff6ab8086bb3cd95f65ad1dd0e7b488c9f80b71905446f4413cb4829441076f54cf196404ecc3e6645bba