Analysis
-
max time kernel
7s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 09:53
Static task
static1
Behavioral task
behavioral1
Sample
1563ac4624ff46770d4e01a3562b9892.exe
Resource
win7-20231215-en
General
-
Target
1563ac4624ff46770d4e01a3562b9892.exe
-
Size
876KB
-
MD5
1563ac4624ff46770d4e01a3562b9892
-
SHA1
984cf4dc2ba3b69b2b27e8106d8a1909bd350ce3
-
SHA256
dce8e4cd152ff4f5e6dd84022b5c7e6190454709fd4f0a122af51a8b9e6c794a
-
SHA512
3deff53d4bc4255b2ea35008b6de0cede06c321ef872cfcb214a88d74724a5af2c7f768c727340815a01b145eb64521c5940ba182505e4451f2e141d8110f53f
-
SSDEEP
24576:saMLKmtvPyHu7tiNxH5f1KSUy9pNg4W7HMZG3bOAHC691:9iKmHyOMbZfQp7syv
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 1748 1563ac4624ff46770d4e01a3562b9892.exe 1748 1563ac4624ff46770d4e01a3562b9892.exe 1748 1563ac4624ff46770d4e01a3562b9892.exe 1748 1563ac4624ff46770d4e01a3562b9892.exe 1748 1563ac4624ff46770d4e01a3562b9892.exe 1748 1563ac4624ff46770d4e01a3562b9892.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1563ac4624ff46770d4e01a3562b9892.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4552 2692 1563ac4624ff46770d4e01a3562b9892.exe 20 PID 2692 wrote to memory of 4552 2692 1563ac4624ff46770d4e01a3562b9892.exe 20 PID 2692 wrote to memory of 4552 2692 1563ac4624ff46770d4e01a3562b9892.exe 20 PID 4552 wrote to memory of 1748 4552 1563ac4624ff46770d4e01a3562b9892.exe 19 PID 4552 wrote to memory of 1748 4552 1563ac4624ff46770d4e01a3562b9892.exe 19 PID 4552 wrote to memory of 1748 4552 1563ac4624ff46770d4e01a3562b9892.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"C:\Users\Admin\AppData\Local\Temp\1563ac4624ff46770d4e01a3562b9892.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5b10ed3b4f780b0ad70822dbca457afd1
SHA1c15ed5e1bd59f020eb55b3921550f60b656b8f41
SHA256cc74d71c1f50850d465e0e619c40e93919192390562eebe8195449bd6285c095
SHA512f049e79af1e54e9bdce5a613cedb496ee6e75966a520ce689a7ac24595c5f8056a69391fad5117529a2031646892aa7db83c271d422bc546b23fd015019c1c12
-
Filesize
385KB
MD5d34c9c4cad1d7e47841da2bb6ccd390b
SHA1fad4bb6faa2c97a11f214df29786f6fb926179ba
SHA25677fe9894672f9bf4c5628ce473c27f8260a13744f972b1eaa337757fe305f91f
SHA51204b20eee87fb87ea381c74ad8f3c2d5dfb08d397ea0f3e1718a4cc989b0d09961430b40997e23a85f76c1019c773e64600fc9df91d742fddbb995165fb00b5ac
-
Filesize
200KB
MD5655fb19735969853b2437a75dd836f82
SHA1d6d6029e2817cec5e52581b3b841e114781ce967
SHA2561093cdfc749b8dd076bbf6ffbdf2ffd975651f45c2f5fc4d4e6655aebda27ab9
SHA512f2b64ef71946cf5a607050e4d7fd03a191436df62af8d167f377bbdeffa255b096ea4b45b9285eab2414faa7dd0b83c48d94ab49db54944e6db20bb370332ecd
-
Filesize
93KB
MD5be616969ce2e32d955826410ce668b1f
SHA1684b2571dcde557f736627abfc72da8e76fd9a9e
SHA256c93b320d10ad186546c4d2c218439014b49fbb705b27894e6dcb53168c3418c4
SHA51229c0e6832d7b23c911169ccdafaa6976f8e120f74a39e1cf9c4762b3d6976596111896ae56ddab583233b059e48f85073f903dc329754b0ca90b7b7858af4e1f