Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
3c70713e66da769700cb809e865f0d63.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c70713e66da769700cb809e865f0d63.exe
Resource
win10v2004-20231215-en
General
-
Target
3c70713e66da769700cb809e865f0d63.exe
-
Size
15KB
-
MD5
3c70713e66da769700cb809e865f0d63
-
SHA1
04da5daf420e98ec4dead911b10e29a59637bafa
-
SHA256
f0252f009c225a4c9720c7a3cf58dcf2492be3fdc534ff8589caf26b481bb552
-
SHA512
6490998e95064bd42411788e5d8099f542c4b1f8a34931468f939d87ec4be7ec5be9432983dd0d58a7767909c2cd30bf0705042b07ace92d8ce2460022ac1747
-
SSDEEP
384:0rTuJj+wS7VYcvqbqQ7ARjSovhx8aJZLB6:7iHqf7bovPtr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2652 aim.exe -
Loads dropped DLL 2 IoCs
pid Process 1620 3c70713e66da769700cb809e865f0d63.exe 1620 3c70713e66da769700cb809e865f0d63.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Advanced Interactive Multimedia = "C:\\Program Files (x86)\\Advanced Interactive Multimedia\\aim.exe" aim.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Advanced Interactive Multimedia\aim.exe 3c70713e66da769700cb809e865f0d63.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2652 1620 3c70713e66da769700cb809e865f0d63.exe 28 PID 1620 wrote to memory of 2652 1620 3c70713e66da769700cb809e865f0d63.exe 28 PID 1620 wrote to memory of 2652 1620 3c70713e66da769700cb809e865f0d63.exe 28 PID 1620 wrote to memory of 2652 1620 3c70713e66da769700cb809e865f0d63.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c70713e66da769700cb809e865f0d63.exe"C:\Users\Admin\AppData\Local\Temp\3c70713e66da769700cb809e865f0d63.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Advanced Interactive Multimedia\aim.exe"C:\Program Files (x86)\Advanced Interactive Multimedia\aim.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD53c70713e66da769700cb809e865f0d63
SHA104da5daf420e98ec4dead911b10e29a59637bafa
SHA256f0252f009c225a4c9720c7a3cf58dcf2492be3fdc534ff8589caf26b481bb552
SHA5126490998e95064bd42411788e5d8099f542c4b1f8a34931468f939d87ec4be7ec5be9432983dd0d58a7767909c2cd30bf0705042b07ace92d8ce2460022ac1747