Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
354896c6546c517a45b367f4f6da6770.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
354896c6546c517a45b367f4f6da6770.exe
Resource
win10v2004-20231215-en
General
-
Target
354896c6546c517a45b367f4f6da6770.exe
-
Size
142KB
-
MD5
354896c6546c517a45b367f4f6da6770
-
SHA1
9b44155b4a0030a91b714112021221a235dfc18e
-
SHA256
3f8ce47bb23364206689b3e6efd225f285b8ad285345d489a04120da971bec91
-
SHA512
e4745f0202bdafe5f170ee3022a16cb9d5100c462daa948b5062bcca881032c0d1bb3c5e415c775583847f56bc341a63f7d70be00867a17da206482ae3917982
-
SSDEEP
3072:qnOn7t7XpdpCCTg/sxFgJ6eqgKJ+BCNC55t2O62ULvMlfMVgdr:qKpdcCrTdgKsnIOfUzMdr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2068 downloadmr.exe -
Loads dropped DLL 4 IoCs
pid Process 2964 354896c6546c517a45b367f4f6da6770.exe 2964 354896c6546c517a45b367f4f6da6770.exe 2964 354896c6546c517a45b367f4f6da6770.exe 2964 354896c6546c517a45b367f4f6da6770.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2068 downloadmr.exe 2068 downloadmr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2068 2964 354896c6546c517a45b367f4f6da6770.exe 28 PID 2964 wrote to memory of 2068 2964 354896c6546c517a45b367f4f6da6770.exe 28 PID 2964 wrote to memory of 2068 2964 354896c6546c517a45b367f4f6da6770.exe 28 PID 2964 wrote to memory of 2068 2964 354896c6546c517a45b367f4f6da6770.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\354896c6546c517a45b367f4f6da6770.exe"C:\Users\Admin\AppData\Local\Temp\354896c6546c517a45b367f4f6da6770.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\nsy19BA.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nsy19BA.tmp\downloadmr.exe /u4eb938a8-a5fc-4ba8-948b-2dad5bc06f2f /e20948982⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD55188b8a7670c194462b47e8761b95e64
SHA155ff1535930d710fbfdae9032c905c0745390458
SHA2566d4f80472de88648a803108beeaae770af072e5cfcdbf601db388732bfadd8f2
SHA5129e0255c3df96b9f320a2da7234ee3601182a425e72ddcee343b3ce21f2639b7363d5ddca2d9e7e1f2e9332273640ec74158a25915cd8cd8b39f98a036e4a37ec
-
Filesize
93KB
MD5e15f3eb88d4a7e446c03bd97e72f18ce
SHA135fd11df8e7403819897a8268c1d1b0cfa87f274
SHA2566d4b7f2baf46df179a5b65f6579d787ba9f9fcffda0280f079bf9549c505f8c1
SHA512e22c2b08a1dcabd433a2a544ebb9c91bf990a0f852b1ba2391ef2a04c062a264fcc1c18252e996dcb8fb79588caf27f307755a4502911c8d11f850427f268f86
-
Filesize
21KB
MD55ebc73650256e9c8ddbcda231db829a1
SHA1988d4535e18754ab2a6248abae96c5697d7dbcd5
SHA2561eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493
SHA512b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270
-
Filesize
109KB
MD5a026ab1efe6767e9bf74692eb59eb499
SHA15956cbaa8561da8def3f185faad547e900eb8567
SHA2564ee62fcb004a23658808251c7c655562b23c324c451ade37f2b8e572a5dcf42b
SHA5127aed4a2e39963a483142bccc873bfc0e37cc1ce966d14540d846f17e5d3794ae9c1e3a3e2de6620e684d6a812eca073d9754830281a0cd64672463c355d74273