Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 23:27
Static task
static1
Behavioral task
behavioral1
Sample
433515bed79b98d79a3accffc0411759.exe
Resource
win7-20231215-en
General
-
Target
433515bed79b98d79a3accffc0411759.exe
-
Size
876KB
-
MD5
433515bed79b98d79a3accffc0411759
-
SHA1
470716e5fea22c5e18f1bb83e40c494c2de5fbda
-
SHA256
1571ad5de881a994ffd00ce6d3e5e80e03c79b6de2f2be281055ca327336ae73
-
SHA512
06d3ba717bed4a8c157683690767b9489ea04484c9d351e47faa53b932edcf4d80f0520c781a0a28c10753fb4acc03a3d3caa8ca2465553a0e1bd01157d359b3
-
SSDEEP
24576:saMLKmtvPyHu7tiNxH5f1KSUy9pNg4W7HMZG3bOAHC69B:9iKmHyOMbZfQp7sy7
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 4028 433515bed79b98d79a3accffc0411759.exe 4028 433515bed79b98d79a3accffc0411759.exe 4028 433515bed79b98d79a3accffc0411759.exe 4028 433515bed79b98d79a3accffc0411759.exe 4028 433515bed79b98d79a3accffc0411759.exe 4028 433515bed79b98d79a3accffc0411759.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 433515bed79b98d79a3accffc0411759.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4960 wrote to memory of 1772 4960 433515bed79b98d79a3accffc0411759.exe 91 PID 4960 wrote to memory of 1772 4960 433515bed79b98d79a3accffc0411759.exe 91 PID 4960 wrote to memory of 1772 4960 433515bed79b98d79a3accffc0411759.exe 91 PID 1772 wrote to memory of 4028 1772 433515bed79b98d79a3accffc0411759.exe 90 PID 1772 wrote to memory of 4028 1772 433515bed79b98d79a3accffc0411759.exe 90 PID 1772 wrote to memory of 4028 1772 433515bed79b98d79a3accffc0411759.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"C:\Users\Admin\AppData\Local\Temp\433515bed79b98d79a3accffc0411759.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5b10ed3b4f780b0ad70822dbca457afd1
SHA1c15ed5e1bd59f020eb55b3921550f60b656b8f41
SHA256cc74d71c1f50850d465e0e619c40e93919192390562eebe8195449bd6285c095
SHA512f049e79af1e54e9bdce5a613cedb496ee6e75966a520ce689a7ac24595c5f8056a69391fad5117529a2031646892aa7db83c271d422bc546b23fd015019c1c12
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5655fb19735969853b2437a75dd836f82
SHA1d6d6029e2817cec5e52581b3b841e114781ce967
SHA2561093cdfc749b8dd076bbf6ffbdf2ffd975651f45c2f5fc4d4e6655aebda27ab9
SHA512f2b64ef71946cf5a607050e4d7fd03a191436df62af8d167f377bbdeffa255b096ea4b45b9285eab2414faa7dd0b83c48d94ab49db54944e6db20bb370332ecd