Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 21:49
Static task
static1
Behavioral task
behavioral1
Sample
3e4dff19e5b1cb3492757eb94442c926.exe
Resource
win7-20231215-en
General
-
Target
3e4dff19e5b1cb3492757eb94442c926.exe
-
Size
877KB
-
MD5
3e4dff19e5b1cb3492757eb94442c926
-
SHA1
21b5d041f88d22701cfe31a8269c2b43a7b693f9
-
SHA256
13e9e9e0e57a0e69aff06835c689709f520f29a69b5c00b403317c6ce525111b
-
SHA512
567b6bac090111bca3803e17f445d880120eb55659e75e1b9949490d7581d620260e4a5ecb402dff860b85dd6635ceb7b79bb8a473367391653f434cbe225d19
-
SSDEEP
24576:XbMLKmtvPyHu7JtwMkcooy9pNg4W7HM8scN+2QHCaAK:LiKmHyONtloSp7s8ZQL
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2368 3e4dff19e5b1cb3492757eb94442c926.exe 2368 3e4dff19e5b1cb3492757eb94442c926.exe 2368 3e4dff19e5b1cb3492757eb94442c926.exe 2368 3e4dff19e5b1cb3492757eb94442c926.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3e4dff19e5b1cb3492757eb94442c926.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1040 wrote to memory of 1252 1040 3e4dff19e5b1cb3492757eb94442c926.exe 28 PID 1040 wrote to memory of 1252 1040 3e4dff19e5b1cb3492757eb94442c926.exe 28 PID 1040 wrote to memory of 1252 1040 3e4dff19e5b1cb3492757eb94442c926.exe 28 PID 1040 wrote to memory of 1252 1040 3e4dff19e5b1cb3492757eb94442c926.exe 28 PID 1040 wrote to memory of 1252 1040 3e4dff19e5b1cb3492757eb94442c926.exe 28 PID 1040 wrote to memory of 1252 1040 3e4dff19e5b1cb3492757eb94442c926.exe 28 PID 1040 wrote to memory of 1252 1040 3e4dff19e5b1cb3492757eb94442c926.exe 28 PID 1252 wrote to memory of 2368 1252 3e4dff19e5b1cb3492757eb94442c926.exe 29 PID 1252 wrote to memory of 2368 1252 3e4dff19e5b1cb3492757eb94442c926.exe 29 PID 1252 wrote to memory of 2368 1252 3e4dff19e5b1cb3492757eb94442c926.exe 29 PID 1252 wrote to memory of 2368 1252 3e4dff19e5b1cb3492757eb94442c926.exe 29 PID 1252 wrote to memory of 2368 1252 3e4dff19e5b1cb3492757eb94442c926.exe 29 PID 1252 wrote to memory of 2368 1252 3e4dff19e5b1cb3492757eb94442c926.exe 29 PID 1252 wrote to memory of 2368 1252 3e4dff19e5b1cb3492757eb94442c926.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e4dff19e5b1cb3492757eb94442c926.exe"C:\Users\Admin\AppData\Local\Temp\3e4dff19e5b1cb3492757eb94442c926.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\3e4dff19e5b1cb3492757eb94442c926.exe"C:\Users\Admin\AppData\Local\Temp\3e4dff19e5b1cb3492757eb94442c926.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\3e4dff19e5b1cb3492757eb94442c926.exe"C:\Users\Admin\AppData\Local\Temp\3e4dff19e5b1cb3492757eb94442c926.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5c7f7f64995a56beef91b4c836f80f973
SHA11600f97691b0c8b77d11a543b11d70b55635e1e9
SHA256102607c00e011614a3f07d8abf9a11a1e17061c44c8f133b7f1865b5b914094d
SHA51263c89cc79f67dbd88406e64807134dc2caa84131c62764d7b519b7ac9f0fe939a91221c77500c8acb3c06a384dc6d332aa7c9feef652d6f4486132235e15c2e8
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5a6c5383912c14097285ac28cda10cfe2
SHA11727988320a7ef118fde99533ca934addc0bea91
SHA2561bde535b3fb3be06360c68d6ec3dc5fe59b871ae4fc7b9d8794a617a0f668732
SHA512fd72dfaf95cb3fca70412b3a6ac3ac436b8963691697e6f65579b5208bf3f6845f10aa404428ff75c824ae618f5cad81b882fc21b38ea98af13703b9e31bb488