Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
3766ea12334892d3fba1cd18ce746854.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3766ea12334892d3fba1cd18ce746854.exe
Resource
win10v2004-20231215-en
General
-
Target
3766ea12334892d3fba1cd18ce746854.exe
-
Size
372KB
-
MD5
3766ea12334892d3fba1cd18ce746854
-
SHA1
a05c7a25a468007950584394c053f77cab067758
-
SHA256
224353a749b00ba8272ce729106c906109cd4a19344a9a716a78f98a692b8ffa
-
SHA512
b87d03fe1c39df6220a377704ad9d27d171504ebc489330f14580b06c53e5443969c6ad49d5c1ab7087f9bacca44b981b6ca888b2ad7cc3fac5479e3d8b4ba4e
-
SSDEEP
6144:tTLrvuVz6P7h0k1xDl5Usoqi31UaHboYfZX:tTHvuIPuk175Usov1PZX
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2144 3766ea12334892d3fba1cd18ce746854.exe 2144 3766ea12334892d3fba1cd18ce746854.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Internet Explorer\Main 3766ea12334892d3fba1cd18ce746854.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2144 3766ea12334892d3fba1cd18ce746854.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2144 3766ea12334892d3fba1cd18ce746854.exe 2144 3766ea12334892d3fba1cd18ce746854.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5189f6bcce743edefe2eda0373b93229b
SHA196c0b9522f7dc70a77ee6af640bba056f1990877
SHA25622bdd92dce6c99c06d5bc56f0e51ea9a1df39424eb3a4628eb76211b890f8529
SHA512272c51f0c9501f2be2a277b881ad8d9c5e8dee333fc42748bdd31319acbd46ba2e206220eaf1067e2992a9f9895da1d606b10524dc0e7933b0fc45bde4fb2f66