Analysis
-
max time kernel
122s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
433515bed79b98d79a3accffc0411759.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
433515bed79b98d79a3accffc0411759.exe
-
Size
876KB
-
MD5
433515bed79b98d79a3accffc0411759
-
SHA1
470716e5fea22c5e18f1bb83e40c494c2de5fbda
-
SHA256
1571ad5de881a994ffd00ce6d3e5e80e03c79b6de2f2be281055ca327336ae73
-
SHA512
06d3ba717bed4a8c157683690767b9489ea04484c9d351e47faa53b932edcf4d80f0520c781a0a28c10753fb4acc03a3d3caa8ca2465553a0e1bd01157d359b3
-
SSDEEP
24576:saMLKmtvPyHu7tiNxH5f1KSUy9pNg4W7HMZG3bOAHC69B:9iKmHyOMbZfQp7sy7
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2664 433515bed79b98d79a3accffc0411759.exe 2664 433515bed79b98d79a3accffc0411759.exe 2664 433515bed79b98d79a3accffc0411759.exe 2664 433515bed79b98d79a3accffc0411759.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 433515bed79b98d79a3accffc0411759.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3020 2120 433515bed79b98d79a3accffc0411759.exe 28 PID 2120 wrote to memory of 3020 2120 433515bed79b98d79a3accffc0411759.exe 28 PID 2120 wrote to memory of 3020 2120 433515bed79b98d79a3accffc0411759.exe 28 PID 2120 wrote to memory of 3020 2120 433515bed79b98d79a3accffc0411759.exe 28 PID 2120 wrote to memory of 3020 2120 433515bed79b98d79a3accffc0411759.exe 28 PID 2120 wrote to memory of 3020 2120 433515bed79b98d79a3accffc0411759.exe 28 PID 2120 wrote to memory of 3020 2120 433515bed79b98d79a3accffc0411759.exe 28 PID 3020 wrote to memory of 2664 3020 433515bed79b98d79a3accffc0411759.exe 29 PID 3020 wrote to memory of 2664 3020 433515bed79b98d79a3accffc0411759.exe 29 PID 3020 wrote to memory of 2664 3020 433515bed79b98d79a3accffc0411759.exe 29 PID 3020 wrote to memory of 2664 3020 433515bed79b98d79a3accffc0411759.exe 29 PID 3020 wrote to memory of 2664 3020 433515bed79b98d79a3accffc0411759.exe 29 PID 3020 wrote to memory of 2664 3020 433515bed79b98d79a3accffc0411759.exe 29 PID 3020 wrote to memory of 2664 3020 433515bed79b98d79a3accffc0411759.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2664
-
-