Analysis
-
max time kernel
3s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 13:17
Static task
static1
Behavioral task
behavioral1
Sample
211ee4f8e0f479c079cba5ceecd08a1e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
211ee4f8e0f479c079cba5ceecd08a1e.exe
Resource
win10v2004-20231215-en
General
-
Target
211ee4f8e0f479c079cba5ceecd08a1e.exe
-
Size
562KB
-
MD5
211ee4f8e0f479c079cba5ceecd08a1e
-
SHA1
6096c1c947bdd40578547d86656ece74076ddf58
-
SHA256
2c68cfdeebba1c13d4eaabef942949104c399cd1b70d2cef550a7b315c75525c
-
SHA512
c66d349e0d05e4edeb2dca5bcbda7237e08d2b38f523629316d39c37d5d7557291bd84fc394dada36c6a9afaa560020c90d02dad1b022fb60f5ca01db25f5961
-
SSDEEP
12288:oPwMDD1dxDx5SCbpK2h6Ieu96aUT7dxIfLbdi8R+3z2f:kt9jF5JU2h6IlLUTUvdRRaz2f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2452 DownloadManager.exe -
Loads dropped DLL 8 IoCs
pid Process 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2452 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 29 PID 2224 wrote to memory of 2452 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 29 PID 2224 wrote to memory of 2452 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 29 PID 2224 wrote to memory of 2452 2224 211ee4f8e0f479c079cba5ceecd08a1e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\211ee4f8e0f479c079cba5ceecd08a1e.exe"C:\Users\Admin\AppData\Local\Temp\211ee4f8e0f479c079cba5ceecd08a1e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\DM_A6RW235Niw\DownloadManager.exeDownloadManager.exe "C:\Users\Admin\AppData\Local\Temp\211ee4f8e0f479c079cba5ceecd08a1e.exe"2⤵
- Executes dropped EXE
PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5031ec9b12afb1fafc9fc397f3b90f29c
SHA1de26ddfe3ef452f8205bfbd5520a8eff6328619f
SHA2562dc320488b636b9dce9581a95e5a833a07500622c1a64fc05023ba6482d2a6e1
SHA512cbebded4e3a87234899e2b67121f898c9060671d25088b7de29bbcbda90a5410dd3afd110417caa6c46ba656e1a863da39127e15c2122fedaa5054f4d43b90a6
-
Filesize
16KB
MD5a555472395178ac8c733d90928e05017
SHA1f44b192d66473f01a6540aaec4b6c9ac4c611d35
SHA25682ae08fced4a1f9a7df123634da5f4cb12af4593a006bef421a54739a2cbd44e
SHA512e6d87b030c45c655d93b2e76d7437ad900df5da2475dd2e6e28b6c872040491e80f540b00b6091d16bc8410bd58a1e82c62ee1b17193ef8500a153d4474bb80a