Analysis
-
max time kernel
43s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 00:49
Static task
static1
Behavioral task
behavioral1
Sample
1e2c754ee22f34dcbfc9c165f04966f1.exe
Resource
win7-20231215-en
General
-
Target
1e2c754ee22f34dcbfc9c165f04966f1.exe
-
Size
4.0MB
-
MD5
1e2c754ee22f34dcbfc9c165f04966f1
-
SHA1
799cee300f36ac4914814607eb3737dc3bc6aacc
-
SHA256
2283c3c722db4373f466fe65a5667c3d911ceacd7f09a6b1f887ef8b54099a72
-
SHA512
33ab543e9e640fa830c7497938b1ab7a29f5555cad827ca7aeecf9c272a6eb09c1941ac53ca2cbd1249c65060fe4f50261d523eff8d67b9323201e780187143f
-
SSDEEP
98304:UJrtkzuy5GB2otTJTKfbcS8KgW6Oo4agSzX/Pb:UBtk82ATJTKQ3KsnX/
Malware Config
Extracted
bitrat
1.38
snkno.duckdns.org:43413
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4116-8-0x0000000005650000-0x0000000005662000-memory.dmp CustAttr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1152 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"1⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"2⤵PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"2⤵PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"2⤵PID:3128
-
-
C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"C:\Users\Admin\AppData\Local\Temp\1e2c754ee22f34dcbfc9c165f04966f1.exe"2⤵PID:4948
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kowzbwsLsiD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF666.tmp"2⤵
- Creates scheduled task(s)
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58136ca5931e945b175e4d2adfdf046b8
SHA138b96c48dd3d8be552f28a2965a8383ba52ad85d
SHA256cf59264a047444a249290e65e79a2718ccb3fb7b21ff2bf3446331dd2ab915e0
SHA51245c4b9751989ed68c1dbd4f2b6ba3bda4ccc05ef8ddb1e8224d37128aa95b163559417e02df5b466fc2d7c0f854ccc477fce45221c8d8a155bea13f7b31a2c78