Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
2dd1f8250c4e0d9f2ddec638c1d1de67.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2dd1f8250c4e0d9f2ddec638c1d1de67.exe
Resource
win10v2004-20231215-en
General
-
Target
2dd1f8250c4e0d9f2ddec638c1d1de67.exe
-
Size
151KB
-
MD5
2dd1f8250c4e0d9f2ddec638c1d1de67
-
SHA1
49bad3744e9a29c4fa3c42aff42a5eb1078f1233
-
SHA256
19ea7bac511355b3b690cd3036a585746194bd2b1e015a1ee169f17dce1fac98
-
SHA512
c637c0e46834ac5cdec5a8e93a081b221dcfa0ee210d9b6aadf59be33995a25a088da3624294fc79086a53eef4699d8691f06d7c6f71e445b9fd6d9fdde914fa
-
SSDEEP
3072:O0cSaH64CXQ253QU6q8TXkKu1eWmmcfyo0:O07Qq15gU6dkFgWmm
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 1 IoCs
pid Process 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 2516 regedit.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2204 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 28 PID 2496 wrote to memory of 2204 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 28 PID 2496 wrote to memory of 2204 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 28 PID 2496 wrote to memory of 2204 2496 2dd1f8250c4e0d9f2ddec638c1d1de67.exe 28 PID 2204 wrote to memory of 2516 2204 regedt32.exe 29 PID 2204 wrote to memory of 2516 2204 regedt32.exe 29 PID 2204 wrote to memory of 2516 2204 regedt32.exe 29 PID 2204 wrote to memory of 2516 2204 regedt32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dd1f8250c4e0d9f2ddec638c1d1de67.exe"C:\Users\Admin\AppData\Local\Temp\2dd1f8250c4e0d9f2ddec638c1d1de67.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\regedt32.exe"C:\Windows\System32\regedt32.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"2⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\regedit.exe" /s "C:\Users\Admin\Documents\Iterra\T03emp03.reg"3⤵
- Runs .reg file with regedit
PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD58dd55d8cd478f9d20758acbc8511c6e6
SHA1b8fec5e7b7841c327819fedee2f08a630950a1bb
SHA256d5622bafa4a555a46880d20215e4abb240039229221abde4f724339096d6956c
SHA512571e308e0f43df6a24f0b754e2df0d8b9f8dea21eef5d283cd58e84b48947857916115321b468c08faff71beff23781f0a3166a98b3cdbc95caf9d9344f636dc
-
Filesize
39KB
MD5f217ddb2b49f173bd63c194be9a562a8
SHA11239966b877ea3d08e3e41e1d4975d4a9413f6e4
SHA256e2c4672e38a8773ab52838985dec19a8d2166b4e9f801b3e53d01fead41253d9
SHA512c11def96d7ca8056387f2480e8ea2d46d2e4a6cb1a886b918f8198083ed9156d8d9a8766871aa8bae5ba1ad3950b9e54f2b2c6313b8a59ba8a6ce0250859e652