Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
2b78a9fef498f8d291408b167c47e7e0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2b78a9fef498f8d291408b167c47e7e0.exe
Resource
win10v2004-20231215-en
General
-
Target
2b78a9fef498f8d291408b167c47e7e0.exe
-
Size
162KB
-
MD5
2b78a9fef498f8d291408b167c47e7e0
-
SHA1
1187e56c1938527111d0ecf95811945682f1b8b2
-
SHA256
bdcfbdcd12bd2260d73bf0187b5b720277de8e9e059275304e9f9f75eb70ed62
-
SHA512
ef3626c2257c6c78259ff58a880ad333d4aad55a2a11ed1489eb2e9f03068bf840eb47b87e47716af3dc9bc4b9c0ffe67af4410748342cedbe34894d924031e2
-
SSDEEP
3072:QaF6FISxuJ8JwIGATL8DFKNbLmxcbTefkTmr3yiRnDLARyBJNtwcLCW+WppXXT:JOMqdHtLZbafVznDLA4BJNJ5+apXXT
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\acpidisk.sys 55.exe File opened for modification C:\Windows\SysWOW64\drivers\acpidisk.sys 55.exe -
Executes dropped EXE 1 IoCs
pid Process 4620 55.exe -
Loads dropped DLL 6 IoCs
pid Process 4740 2b78a9fef498f8d291408b167c47e7e0.exe 4620 55.exe 4620 55.exe 4620 55.exe 4620 55.exe 4740 2b78a9fef498f8d291408b167c47e7e0.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\mscpx32r.det 55.exe File opened for modification C:\Windows\SysWOW64\mscpx32r.det 55.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 680 Process not Found -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4740 wrote to memory of 4620 4740 2b78a9fef498f8d291408b167c47e7e0.exe 89 PID 4740 wrote to memory of 4620 4740 2b78a9fef498f8d291408b167c47e7e0.exe 89 PID 4740 wrote to memory of 4620 4740 2b78a9fef498f8d291408b167c47e7e0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b78a9fef498f8d291408b167c47e7e0.exe"C:\Users\Admin\AppData\Local\Temp\2b78a9fef498f8d291408b167c47e7e0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\55.exe"C:\Users\Admin\AppData\Local\Temp\55.exe" 70222⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:4620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD520f2c12bec56ca3108b77074998d7624
SHA1612f2e732f460e492b56f658a48d157f53e34ca2
SHA256b2ea8203d010efb15e9272f282836747e50f6d450507c9d66f0ce9d882a08c1f
SHA512b7e985328d135bd541bc9eaf5acce7c02f2ebdefb6e861bfc088f17e7037ed1de1a4c8d8e8b5b7fa05c35d42eb07254ad57f4f069c2ac73a6728c84f1fc2a45a
-
Filesize
72KB
MD5292975cdcc2c9a5d2ceab42d55f3ca44
SHA167d7dc2fdbd8f7613f0c09d3d379d03541912098
SHA2560ce54a891beb46b1fd27e1fb7ce440826436a35fb2b9255495586c6883f2ebbf
SHA512b14d84b92315bb4a66df7f081b8a271d8e1c23d85de737c74178772363300d1c4cb9fbca2bd86fc85bfe2e8774f0caaeef9c8228676a2e6b23e9a1753d63d91d
-
Filesize
194KB
MD5ee4d20481c291eb2f6d70d013c9a4725
SHA1697a45c22ddba20b20655a00c826e275a5afa4c7
SHA256ebbdfaca077eb30d485c3db2427a0033940b080bfe32eed350911a1918dddfc8
SHA51201142334775b1de3bfc4cd901fab3914cd860bd9d088d6b240ecdca7c8d72dfa1e382a37aaf60055770da94068c9d9d2dd0f008bd1cec624584f5b7e83670f40
-
Filesize
10KB
MD561151aff8c92ca17b3fab51ce1ca7156
SHA168a02015863c2877a20c27da45704028dbaa7eff
SHA256af15ef6479e5ac5752d139d1c477ec02def9077df897dadc8297005b3fc4999d
SHA5124f5c943b7058910dc635bdcfadfea1d369c3d645239d1a52b030c21f43aac8e76549e52fd28e38ba5341d32aefe3c090dd8377d9e105ad77f71ab8870d8e326e
-
Filesize
9KB
MD5afd989ef7eec6bf952bedfce541fe236
SHA15654b71c5b1089c2cec6381d8da5bd14a14e1a37
SHA2565e97602008ba004c72d58f71e77ffe0a0ea01103867eb12a9ec0f28e72f440d8
SHA512f4e3d88477d39218667dd482a08904b2b69435db7d1fdd492380544aff83895d393a288c329da69074b69c68f51db45f694dfea81fc12fa2042ed43b3d06440c