Analysis
-
max time kernel
239s -
max time network
287s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
1563ac4624ff46770d4e01a3562b9892.exe
Resource
win7-20231215-en
General
-
Target
1563ac4624ff46770d4e01a3562b9892.exe
-
Size
876KB
-
MD5
1563ac4624ff46770d4e01a3562b9892
-
SHA1
984cf4dc2ba3b69b2b27e8106d8a1909bd350ce3
-
SHA256
dce8e4cd152ff4f5e6dd84022b5c7e6190454709fd4f0a122af51a8b9e6c794a
-
SHA512
3deff53d4bc4255b2ea35008b6de0cede06c321ef872cfcb214a88d74724a5af2c7f768c727340815a01b145eb64521c5940ba182505e4451f2e141d8110f53f
-
SSDEEP
24576:saMLKmtvPyHu7tiNxH5f1KSUy9pNg4W7HMZG3bOAHC691:9iKmHyOMbZfQp7syv
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2884 1563ac4624ff46770d4e01a3562b9892.exe 2884 1563ac4624ff46770d4e01a3562b9892.exe 2884 1563ac4624ff46770d4e01a3562b9892.exe 2884 1563ac4624ff46770d4e01a3562b9892.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1563ac4624ff46770d4e01a3562b9892.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2852 wrote to memory of 1140 2852 1563ac4624ff46770d4e01a3562b9892.exe 27 PID 2852 wrote to memory of 1140 2852 1563ac4624ff46770d4e01a3562b9892.exe 27 PID 2852 wrote to memory of 1140 2852 1563ac4624ff46770d4e01a3562b9892.exe 27 PID 2852 wrote to memory of 1140 2852 1563ac4624ff46770d4e01a3562b9892.exe 27 PID 2852 wrote to memory of 1140 2852 1563ac4624ff46770d4e01a3562b9892.exe 27 PID 2852 wrote to memory of 1140 2852 1563ac4624ff46770d4e01a3562b9892.exe 27 PID 2852 wrote to memory of 1140 2852 1563ac4624ff46770d4e01a3562b9892.exe 27 PID 1140 wrote to memory of 2884 1140 1563ac4624ff46770d4e01a3562b9892.exe 28 PID 1140 wrote to memory of 2884 1140 1563ac4624ff46770d4e01a3562b9892.exe 28 PID 1140 wrote to memory of 2884 1140 1563ac4624ff46770d4e01a3562b9892.exe 28 PID 1140 wrote to memory of 2884 1140 1563ac4624ff46770d4e01a3562b9892.exe 28 PID 1140 wrote to memory of 2884 1140 1563ac4624ff46770d4e01a3562b9892.exe 28 PID 1140 wrote to memory of 2884 1140 1563ac4624ff46770d4e01a3562b9892.exe 28 PID 1140 wrote to memory of 2884 1140 1563ac4624ff46770d4e01a3562b9892.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5b10ed3b4f780b0ad70822dbca457afd1
SHA1c15ed5e1bd59f020eb55b3921550f60b656b8f41
SHA256cc74d71c1f50850d465e0e619c40e93919192390562eebe8195449bd6285c095
SHA512f049e79af1e54e9bdce5a613cedb496ee6e75966a520ce689a7ac24595c5f8056a69391fad5117529a2031646892aa7db83c271d422bc546b23fd015019c1c12
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5655fb19735969853b2437a75dd836f82
SHA1d6d6029e2817cec5e52581b3b841e114781ce967
SHA2561093cdfc749b8dd076bbf6ffbdf2ffd975651f45c2f5fc4d4e6655aebda27ab9
SHA512f2b64ef71946cf5a607050e4d7fd03a191436df62af8d167f377bbdeffa255b096ea4b45b9285eab2414faa7dd0b83c48d94ab49db54944e6db20bb370332ecd