Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:22
Behavioral task
behavioral1
Sample
21642882df1673f7106d09e584928800.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21642882df1673f7106d09e584928800.exe
Resource
win10v2004-20231215-en
General
-
Target
21642882df1673f7106d09e584928800.exe
-
Size
1.6MB
-
MD5
21642882df1673f7106d09e584928800
-
SHA1
bfdffbb37115c481338402b3681d755e6df962fd
-
SHA256
a9ecf0bad3e5fa9127ff5129f3b5d296d7ea300749640769172a25462a66544c
-
SHA512
60b95d88b10cae799bc076c20c242993b60cde8acee6172634f312bb6d36900baeb135c3f053ebff1ef1051a4bb5db5e3ad6a526f50d74aae30dec25e2e4cd06
-
SSDEEP
12288:t18lhpUow8MCjJPsTaCB0xP8xFRORDj5pmd31KAfNl/uw932wyqj2PM0UU9oSs:ZflJiw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5032 lde1.exe 4044 lde1.exe -
resource yara_rule behavioral2/memory/3716-0-0x0000000000400000-0x0000000000592000-memory.dmp upx behavioral2/memory/3716-6-0x0000000000400000-0x0000000000592000-memory.dmp upx behavioral2/memory/880-8-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/880-7-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/880-5-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/880-3-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/files/0x000800000002320a-12.dat upx behavioral2/memory/5032-21-0x0000000000400000-0x0000000000592000-memory.dmp upx behavioral2/memory/4044-23-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/4044-22-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/4044-24-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/5032-17-0x0000000000400000-0x0000000000592000-memory.dmp upx behavioral2/memory/880-14-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/files/0x000800000002320a-11.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lde1 = "c:\\windows\\lde1.exe" lde1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3716 set thread context of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 5032 set thread context of 4044 5032 lde1.exe 56 -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\lde1.exe 21642882df1673f7106d09e584928800.exe File opened for modification \??\c:\windows\lde1.exe 21642882df1673f7106d09e584928800.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3716 21642882df1673f7106d09e584928800.exe 5032 lde1.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 3716 wrote to memory of 880 3716 21642882df1673f7106d09e584928800.exe 20 PID 880 wrote to memory of 5032 880 21642882df1673f7106d09e584928800.exe 57 PID 880 wrote to memory of 5032 880 21642882df1673f7106d09e584928800.exe 57 PID 880 wrote to memory of 5032 880 21642882df1673f7106d09e584928800.exe 57 PID 5032 wrote to memory of 4044 5032 lde1.exe 56 PID 5032 wrote to memory of 4044 5032 lde1.exe 56 PID 5032 wrote to memory of 4044 5032 lde1.exe 56 PID 5032 wrote to memory of 4044 5032 lde1.exe 56 PID 5032 wrote to memory of 4044 5032 lde1.exe 56 PID 5032 wrote to memory of 4044 5032 lde1.exe 56 PID 5032 wrote to memory of 4044 5032 lde1.exe 56 PID 5032 wrote to memory of 4044 5032 lde1.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\21642882df1673f7106d09e584928800.exe"C:\Users\Admin\AppData\Local\Temp\21642882df1673f7106d09e584928800.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\21642882df1673f7106d09e584928800.exe"C:\Users\Admin\AppData\Local\Temp\21642882df1673f7106d09e584928800.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:880 -
\??\c:\windows\lde1.exec:\windows\lde1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5032
-
-
-
\??\c:\windows\lde1.exe"c:\windows\lde1.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f7aeffc2bdf1675518800c13e979a2dd
SHA1b7e7e6dc5717d46d7a3770b6e084c9f4c596d403
SHA256fb70ebf3f77a08589ad433355a17edb9a60150e3c0897a13a2d46602242c05e7
SHA5120b2108557f83802225e0d979fd131d729a4d54ba922dabb836205ace734b8436a8477ca91eb510849d0eb04c01ad7f482b3bc44432d284a28b085f1b4beae0c9
-
Filesize
92KB
MD59d667669799f75245938cf37d9139011
SHA12f1a0c463f70272bdb36f8d6668c0fb2ec71e629
SHA256ac13d678c8eb407a896270e4e942205c93361533d6d0eb3ffc2ed2df495466c6
SHA51298321e33003fbbd42f8b4c8f60a79088aee4c4eaf0707d49259f9c5fb443d21bd9163992ca6b4242477425011d0c1a75c6912cc2e9bf1173779117e1a921ac92