Analysis
-
max time kernel
15s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:53
Static task
static1
Behavioral task
behavioral1
Sample
1557713c44d32ab80d3d4f7f2ffd13a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1557713c44d32ab80d3d4f7f2ffd13a0.exe
Resource
win10v2004-20231215-en
General
-
Target
1557713c44d32ab80d3d4f7f2ffd13a0.exe
-
Size
60KB
-
MD5
1557713c44d32ab80d3d4f7f2ffd13a0
-
SHA1
22b74f1beebe39bab24f21eaf6a91952d729b90a
-
SHA256
15c409c4cc163c8b40c7c91e34cf4fa9fbbd40a0fe1882243a000c137820ccc1
-
SHA512
b90b20aacc975a428c9235d739994e1ceb41dc7e3c8db9a79b03552712f50a542fdc08b86b43911ebc4404f53bb85ee8e282d76081337ef281c8587ec89a58b9
-
SSDEEP
768:iVmNUnj+uecfFyN73uR1NJr0RrLYJQhCoPyXD4q+B83HGAJJ3TpR5P1sMRKVytcj:pNUnK2wNjOXyN8oPyTH083HGATRv8m/a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2620 wmpencen.exe -
Loads dropped DLL 4 IoCs
pid Process 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpencen.exe 1557713c44d32ab80d3d4f7f2ffd13a0.exe File opened for modification C:\Windows\SysWOW64\wmpencen.exe 1557713c44d32ab80d3d4f7f2ffd13a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2620 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe 33 PID 2844 wrote to memory of 2620 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe 33 PID 2844 wrote to memory of 2620 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe 33 PID 2844 wrote to memory of 2620 2844 1557713c44d32ab80d3d4f7f2ffd13a0.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1557713c44d32ab80d3d4f7f2ffd13a0.exe"C:\Users\Admin\AppData\Local\Temp\1557713c44d32ab80d3d4f7f2ffd13a0.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\1557713c44d32ab80d3d4f7f2ffd13a0.exe"2⤵PID:2588
-
-
C:\Windows\SysWOW64\wmpencen.exe"C:\Windows\system32\wmpencen.exe"2⤵
- Executes dropped EXE
PID:2620
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wmpencen.exe"1⤵PID:2616