Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
4872fcca2f34673e20e8969d6897fb26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4872fcca2f34673e20e8969d6897fb26.exe
Resource
win10v2004-20231215-en
General
-
Target
4872fcca2f34673e20e8969d6897fb26.exe
-
Size
217KB
-
MD5
4872fcca2f34673e20e8969d6897fb26
-
SHA1
61f4903edc1f6366f993d6e6f4b64f4bb4855180
-
SHA256
8f7313789ce1289f3155ee4e46b2d1760f8097f31ec05d4fbe2b185766fd9d5d
-
SHA512
f77b44d20be14403e60559613148876512b5153b98ee7692348215a161f0ca41e98cf18c7aa628101eabfe653b05045491f693e6366accc4e0ed5b4c5526670d
-
SSDEEP
6144:NAJzqnhxwEa0JyJsx2bLPI0ADVoACLgk:SxWoEawyJHLALEg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2764 Awezya.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Awezya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Awezya.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4872fcca2f34673e20e8969d6897fb26.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4872fcca2f34673e20e8969d6897fb26.exe File created C:\Windows\Awezya.exe 4872fcca2f34673e20e8969d6897fb26.exe File opened for modification C:\Windows\Awezya.exe 4872fcca2f34673e20e8969d6897fb26.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main Awezya.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\International Awezya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe 2764 Awezya.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2764 2432 4872fcca2f34673e20e8969d6897fb26.exe 28 PID 2432 wrote to memory of 2764 2432 4872fcca2f34673e20e8969d6897fb26.exe 28 PID 2432 wrote to memory of 2764 2432 4872fcca2f34673e20e8969d6897fb26.exe 28 PID 2432 wrote to memory of 2764 2432 4872fcca2f34673e20e8969d6897fb26.exe 28 PID 2432 wrote to memory of 2764 2432 4872fcca2f34673e20e8969d6897fb26.exe 28 PID 2432 wrote to memory of 2764 2432 4872fcca2f34673e20e8969d6897fb26.exe 28 PID 2432 wrote to memory of 2764 2432 4872fcca2f34673e20e8969d6897fb26.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4872fcca2f34673e20e8969d6897fb26.exe"C:\Users\Admin\AppData\Local\Temp\4872fcca2f34673e20e8969d6897fb26.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\Awezya.exeC:\Windows\Awezya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217KB
MD54872fcca2f34673e20e8969d6897fb26
SHA161f4903edc1f6366f993d6e6f4b64f4bb4855180
SHA2568f7313789ce1289f3155ee4e46b2d1760f8097f31ec05d4fbe2b185766fd9d5d
SHA512f77b44d20be14403e60559613148876512b5153b98ee7692348215a161f0ca41e98cf18c7aa628101eabfe653b05045491f693e6366accc4e0ed5b4c5526670d
-
Filesize
344B
MD5ac722efab6cf575d28328b4b8f5be85d
SHA191258e8e1068a54ea4dac6083122c1576b194e6d
SHA2562785540f0dc8b6c3ae8acea9b56db64b1b50f45f0dbb0997423b2de9a7717be4
SHA5123a3e50bc2aa2c05d2f9ffb64f3c1786850af03a1ccd36ece1623f1dfbe4bb8528fc943edae1f76b25daf7e1d4ad191ec52e1dbf90d0786124f198000551d8592