Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 15:12
Static task
static1
Behavioral task
behavioral1
Sample
285e4d422534b954d4307ac54283d3ef.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
285e4d422534b954d4307ac54283d3ef.exe
Resource
win10v2004-20231215-en
General
-
Target
285e4d422534b954d4307ac54283d3ef.exe
-
Size
583KB
-
MD5
285e4d422534b954d4307ac54283d3ef
-
SHA1
d82cc2c9606b1693572aa451c9dbc8a44cbf126d
-
SHA256
c1a02b20ca174ac4fd90164adb8abf5770f66e2c278c02c161ecd3dc9ef968d7
-
SHA512
69efae686e04611e121a7182269d73595487c99d4b35ac0337ab6143efdafc9a738e07de256d279aae1e5e5b472767cd844f941ff310be0b85b10be18880039d
-
SSDEEP
12288:A67TS8P7q8lJ45iMMa80Yv9NBe7Io3Gmvk26c9dCa:f7T3TRJ4s1aY9UIoG6dCa
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2936 C02.exe 3032 C41.exe 1728 System -
Loads dropped DLL 4 IoCs
pid Process 3020 285e4d422534b954d4307ac54283d3ef.exe 3020 285e4d422534b954d4307ac54283d3ef.exe 3020 285e4d422534b954d4307ac54283d3ef.exe 3020 285e4d422534b954d4307ac54283d3ef.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\System C02.exe File opened for modification C:\Windows\SysWOW64\System C02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3032 C41.exe 3032 C41.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2936 3020 285e4d422534b954d4307ac54283d3ef.exe 18 PID 3020 wrote to memory of 2936 3020 285e4d422534b954d4307ac54283d3ef.exe 18 PID 3020 wrote to memory of 2936 3020 285e4d422534b954d4307ac54283d3ef.exe 18 PID 3020 wrote to memory of 2936 3020 285e4d422534b954d4307ac54283d3ef.exe 18 PID 3020 wrote to memory of 3032 3020 285e4d422534b954d4307ac54283d3ef.exe 17 PID 3020 wrote to memory of 3032 3020 285e4d422534b954d4307ac54283d3ef.exe 17 PID 3020 wrote to memory of 3032 3020 285e4d422534b954d4307ac54283d3ef.exe 17 PID 3020 wrote to memory of 3032 3020 285e4d422534b954d4307ac54283d3ef.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\285e4d422534b954d4307ac54283d3ef.exe"C:\Users\Admin\AppData\Local\Temp\285e4d422534b954d4307ac54283d3ef.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\C41.exe"C:\Users\Admin\AppData\Local\Temp\C41.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\C02.exe"C:\Users\Admin\AppData\Local\Temp\C02.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2936
-
-
C:\Windows\SysWOW64\SystemC:\Windows\SysWOW64\System1⤵
- Executes dropped EXE
PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5ef9a227724c086590ee45b0c402ca5cb
SHA18e6b52899e77bdc87c5c6957f47dc40af0f99114
SHA256ef8c2742f0ddf3ce2fde7520e881e319f568cea58c7905f81a8c338202a4f901
SHA512be6b2b7bdff3c85f733d4454148e1169f0d45615d929e3d130021bfed56468ec02c14347e70fedf75c9e4b98544762ed119a742720dded1655735dc86251ae1a