Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 19:16
Static task
static1
Behavioral task
behavioral1
Sample
373c84e0ec1b0599572063b2881e160a.exe
Resource
win7-20231215-en
General
-
Target
373c84e0ec1b0599572063b2881e160a.exe
-
Size
876KB
-
MD5
373c84e0ec1b0599572063b2881e160a
-
SHA1
67fbf275624b5f6034bdaac09579b0c6f85e0d84
-
SHA256
2195b6cc3ae0b891a9b9cb2f69cebb158e0e7654b87030c5e541ef28ba96fd5e
-
SHA512
0450cef30463e423d372f599aee5a939da10412e37965406cd59051f35c7028dcd50d5938d489d0d382dd1addda99bc8e08becd34aeadeb5742690b8579c4c32
-
SSDEEP
24576:oIMLKmtvPyHu7ICxUR7y9pNg4W7HMYG3bOAHCwJZ:HiKmHyOXY/p7s3V
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1748 373c84e0ec1b0599572063b2881e160a.exe 1748 373c84e0ec1b0599572063b2881e160a.exe 1748 373c84e0ec1b0599572063b2881e160a.exe 1748 373c84e0ec1b0599572063b2881e160a.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 373c84e0ec1b0599572063b2881e160a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 700 wrote to memory of 1720 700 373c84e0ec1b0599572063b2881e160a.exe 17 PID 700 wrote to memory of 1720 700 373c84e0ec1b0599572063b2881e160a.exe 17 PID 700 wrote to memory of 1720 700 373c84e0ec1b0599572063b2881e160a.exe 17 PID 700 wrote to memory of 1720 700 373c84e0ec1b0599572063b2881e160a.exe 17 PID 700 wrote to memory of 1720 700 373c84e0ec1b0599572063b2881e160a.exe 17 PID 700 wrote to memory of 1720 700 373c84e0ec1b0599572063b2881e160a.exe 17 PID 700 wrote to memory of 1720 700 373c84e0ec1b0599572063b2881e160a.exe 17 PID 1720 wrote to memory of 1748 1720 373c84e0ec1b0599572063b2881e160a.exe 16 PID 1720 wrote to memory of 1748 1720 373c84e0ec1b0599572063b2881e160a.exe 16 PID 1720 wrote to memory of 1748 1720 373c84e0ec1b0599572063b2881e160a.exe 16 PID 1720 wrote to memory of 1748 1720 373c84e0ec1b0599572063b2881e160a.exe 16 PID 1720 wrote to memory of 1748 1720 373c84e0ec1b0599572063b2881e160a.exe 16 PID 1720 wrote to memory of 1748 1720 373c84e0ec1b0599572063b2881e160a.exe 16 PID 1720 wrote to memory of 1748 1720 373c84e0ec1b0599572063b2881e160a.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\373c84e0ec1b0599572063b2881e160a.exe"C:\Users\Admin\AppData\Local\Temp\373c84e0ec1b0599572063b2881e160a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\373c84e0ec1b0599572063b2881e160a.exe"C:\Users\Admin\AppData\Local\Temp\373c84e0ec1b0599572063b2881e160a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\373c84e0ec1b0599572063b2881e160a.exe"C:\Users\Admin\AppData\Local\Temp\373c84e0ec1b0599572063b2881e160a.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5ac13346cd83b17e0f1d9dcd67d4b03ab
SHA1af4e3a9d6854ab2c072ce4cbdeffc9ca8efd62ce
SHA256d840535f9582b5db72a3e55eeaf9c9ffb939a572b8893ebc121fe9b53e0102ea
SHA5127f8c80eaac8e80b37fdb7af107b9ee8da9eda28dea7a88e0d68556f838a9eaa85e3ea203d611c4fea0af08a29a6f5e9ba822c0d23c1612a42092e102661ae7de