Analysis
-
max time kernel
1s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
1051331377ce2c05fe7df572f776b3c2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1051331377ce2c05fe7df572f776b3c2.exe
Resource
win10v2004-20231215-en
General
-
Target
1051331377ce2c05fe7df572f776b3c2.exe
-
Size
447KB
-
MD5
1051331377ce2c05fe7df572f776b3c2
-
SHA1
61b8072f3ff65e094dafd22772322dda2d423bbb
-
SHA256
23b5eed5ea35c2a4e220bcccda53d3b74361084c2c001916b68e1c89edb4b5a3
-
SHA512
56342e9b9a6001c7c768b93554104b70588a5004e15d6f90521ecd92dee3d749a5d32981e974471fe3da98eb626c0093ea35c9c3e75eac5bfddbe820453204a2
-
SSDEEP
12288:7LxKg15iJA3sc3Xy9uTk4FF1g38Hx1iCJXOyC1aNJjrlIpGPyh:7LxK83N3i9uTk4rH1fiaNhRIpGPyh
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4612 mf.exe 2932 ef.exe -
Loads dropped DLL 10 IoCs
pid Process 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe 2476 1051331377ce2c05fe7df572f776b3c2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2476 wrote to memory of 4612 2476 1051331377ce2c05fe7df572f776b3c2.exe 27 PID 2476 wrote to memory of 4612 2476 1051331377ce2c05fe7df572f776b3c2.exe 27 PID 2476 wrote to memory of 4612 2476 1051331377ce2c05fe7df572f776b3c2.exe 27 PID 2476 wrote to memory of 2932 2476 1051331377ce2c05fe7df572f776b3c2.exe 26 PID 2476 wrote to memory of 2932 2476 1051331377ce2c05fe7df572f776b3c2.exe 26 PID 2476 wrote to memory of 2932 2476 1051331377ce2c05fe7df572f776b3c2.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\1051331377ce2c05fe7df572f776b3c2.exe"C:\Users\Admin\AppData\Local\Temp\1051331377ce2c05fe7df572f776b3c2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\ef.exeC:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\ef.exe "C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\inetc.dll" -1112⤵
- Executes dropped EXE
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\mf.exeC:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\mf.exe "C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\inetc.dll"2⤵
- Executes dropped EXE
PID:4612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
2KB
MD5b8a00d99534bf83442b20b2474b767cf
SHA1505d3f6591db0f87a73a0ac820cc2eba5171cfff
SHA256cc6d58b72d806d7f314d31fbea1fd3b72708b2f9dd6d7203e12cf0e076337af6
SHA51275df70621957af1bb2c072ca76cd6f9c5cd92d11e54691daa87d37c0c8bdad5979f8679b49e3e5fc5aa83081ef7b85e6b46393a0877520583d7cca43874ebbd5
-
Filesize
19KB
MD5e93d89074477fec8889ebac9d62b5c39
SHA1efd9720cbfaad9422a7861df1de9a62ade2f01ab
SHA2565d4a0d7b0ffc7c66ed1c82f9a1113171144ce8b4e13b1d32a63633b903681e7f
SHA512e6b208739e9a3c555b7a652a05950e375732352ace80454b50d6f9fd7d39942827ef4c86ed8e707361b299d7a0eaccf368be50eb337739da956537242072f488
-
Filesize
9KB
MD59e58ede648d8d1440df0837ed5876e4d
SHA10752f706596d3fc29efab8b08ebe68dd45ad8d76
SHA2569587850fc6e0cfee023d884e69418219f00726d6d4b029f7d1172d85ec3bae0a
SHA51235222bf5fa64828dfccd4676d6d17c2e3e9f8707e9d2edfb1dde2bb0ac5e0d8cd0f13c4fc5130a8701c1456c1fd0efad2bc5f139f80961f897d585eb1de5ec83
-
Filesize
9KB
MD5189f6fe10648792200f5ba64343274a7
SHA15bb1c9d0b4eee3c64daff88707773f78b60be527
SHA2563f13b20ce35f5893a03f2a823ad4287e52932dedd0a7a23c6f57384f43d583d9
SHA512dda2f0a9376018c3a64340a1996395d4b86ef519cfc60a1a1f641376119662f969ede0155d47c78789a69520842a888eec0ba67fc94fe3e62e2fc8a914f15088
-
Filesize
2KB
MD5224df7127c7ee69e67380eefc983a6ff
SHA1236c342c5bd1f71725534d097fcd8538dd95aa56
SHA2569ca35b84699aff2125cbe775c0731e69dad1d667d3ceec6db59c954dd9c83965
SHA512c238c9fb0285eadd63e9f819b4aead95d88f312ef2a11749a879ba105a0c590e23e2def83f9cd8860744b9307bf12c71fbffbb482fa143e3b13b7934c23df80f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe