Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 01:15
Static task
static1
Behavioral task
behavioral1
Sample
48791dc53c94b7a596a53c2f22d97e48.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48791dc53c94b7a596a53c2f22d97e48.exe
Resource
win10v2004-20231215-en
General
-
Target
48791dc53c94b7a596a53c2f22d97e48.exe
-
Size
142KB
-
MD5
48791dc53c94b7a596a53c2f22d97e48
-
SHA1
c5b23e2ca66749b58368364881f4f21f51693209
-
SHA256
6287855193049dc9dc14c7e7d2833110ae4b6b0e0b7a7847b68252fb8daec855
-
SHA512
6b6289feca03ac6bb3992ee8c16f68544b24cfdb73249596bca301391a354e5bfef71aed11e6c526c5bf0038fc525d6d1f9b4775e7b248d5e58bde87010ad5c3
-
SSDEEP
3072:6nOn7t7XpdpCCTg/sxFgJaeqgKJ+BCeC4rmFhV/RAbCGdIiLF7:6KpdcCrTdgKb4KhXA22IE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2368 downloadmr.exe -
Loads dropped DLL 4 IoCs
pid Process 2996 48791dc53c94b7a596a53c2f22d97e48.exe 2996 48791dc53c94b7a596a53c2f22d97e48.exe 2996 48791dc53c94b7a596a53c2f22d97e48.exe 2996 48791dc53c94b7a596a53c2f22d97e48.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2368 downloadmr.exe 2368 downloadmr.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2368 2996 48791dc53c94b7a596a53c2f22d97e48.exe 28 PID 2996 wrote to memory of 2368 2996 48791dc53c94b7a596a53c2f22d97e48.exe 28 PID 2996 wrote to memory of 2368 2996 48791dc53c94b7a596a53c2f22d97e48.exe 28 PID 2996 wrote to memory of 2368 2996 48791dc53c94b7a596a53c2f22d97e48.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\48791dc53c94b7a596a53c2f22d97e48.exe"C:\Users\Admin\AppData\Local\Temp\48791dc53c94b7a596a53c2f22d97e48.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\nso30A4.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nso30A4.tmp\downloadmr.exe /u4d488269-6268-4c29-b4c2-79305bc06ebe /e505832⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55ebc73650256e9c8ddbcda231db829a1
SHA1988d4535e18754ab2a6248abae96c5697d7dbcd5
SHA2561eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493
SHA512b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270