Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:51
Static task
static1
Behavioral task
behavioral1
Sample
39553eabebbc71a0c880a5341cded7ba.exe
Resource
win7-20231215-en
General
-
Target
39553eabebbc71a0c880a5341cded7ba.exe
-
Size
877KB
-
MD5
39553eabebbc71a0c880a5341cded7ba
-
SHA1
a6b80b531457254e6ee2311face4f089c6ae9071
-
SHA256
22100ac14cae92e48720ac6fe370bd124436f8596e7bb4ad8047967215953601
-
SHA512
e579530d47a1b7409427278385fa03ba989afa26a95c54c3380a4cd8322d0c6398cd0de179704b136edecdf0c12be161c29cdb7ccb64d84c1944ed82d0ea5744
-
SSDEEP
24576:bsMLKmtvPyHu70twEMsKo0nry9pNg4W7HM84cN+2QHCnZ:QiKmHyOgtC/p7s8FQ4
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 2580 39553eabebbc71a0c880a5341cded7ba.exe 2580 39553eabebbc71a0c880a5341cded7ba.exe 2580 39553eabebbc71a0c880a5341cded7ba.exe 2580 39553eabebbc71a0c880a5341cded7ba.exe 2580 39553eabebbc71a0c880a5341cded7ba.exe 2580 39553eabebbc71a0c880a5341cded7ba.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 39553eabebbc71a0c880a5341cded7ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4220 wrote to memory of 2828 4220 39553eabebbc71a0c880a5341cded7ba.exe 91 PID 4220 wrote to memory of 2828 4220 39553eabebbc71a0c880a5341cded7ba.exe 91 PID 4220 wrote to memory of 2828 4220 39553eabebbc71a0c880a5341cded7ba.exe 91 PID 2828 wrote to memory of 2580 2828 39553eabebbc71a0c880a5341cded7ba.exe 92 PID 2828 wrote to memory of 2580 2828 39553eabebbc71a0c880a5341cded7ba.exe 92 PID 2828 wrote to memory of 2580 2828 39553eabebbc71a0c880a5341cded7ba.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"C:\Users\Admin\AppData\Local\Temp\39553eabebbc71a0c880a5341cded7ba.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD51dea784ff1b4169d5aa54aab380c6c50
SHA19a3623aa322e54b2eff103aa9d02c727b6e193b6
SHA25683c97f66f438b47646b81387e66c6a83d2aaa33df8305a742bdd82a8cc847f5f
SHA512d250edb737411ff1317d34226bb650c76ae3496996a8e620c65d8f774fdb085c9acf6ed2399c56150dff11bac2186112c757fefd265b6ac482b497e032b92521
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5bfe5a20ccb7a01803d1fbd54889a40a1
SHA1bc90756946c141b4ecf458f5832837c1656ff8c0
SHA256f21e00d76b17a06db762843c63d5a9e638dfbde3d08a43db496264464452afe2
SHA51229b14329f8dd9bc5c2860f8be807dd498dfad3b8aae44792e2def95b8faf47c38621944a44cffcb869ae931b50c675e722f02f5fe03e19894b1694220a8b2beb