Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 01:15
Static task
static1
Behavioral task
behavioral1
Sample
48791dc53c94b7a596a53c2f22d97e48.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48791dc53c94b7a596a53c2f22d97e48.exe
Resource
win10v2004-20231215-en
General
-
Target
48791dc53c94b7a596a53c2f22d97e48.exe
-
Size
142KB
-
MD5
48791dc53c94b7a596a53c2f22d97e48
-
SHA1
c5b23e2ca66749b58368364881f4f21f51693209
-
SHA256
6287855193049dc9dc14c7e7d2833110ae4b6b0e0b7a7847b68252fb8daec855
-
SHA512
6b6289feca03ac6bb3992ee8c16f68544b24cfdb73249596bca301391a354e5bfef71aed11e6c526c5bf0038fc525d6d1f9b4775e7b248d5e58bde87010ad5c3
-
SSDEEP
3072:6nOn7t7XpdpCCTg/sxFgJaeqgKJ+BCeC4rmFhV/RAbCGdIiLF7:6KpdcCrTdgKb4KhXA22IE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4528 downloadmr.exe -
Loads dropped DLL 2 IoCs
pid Process 1596 48791dc53c94b7a596a53c2f22d97e48.exe 1596 48791dc53c94b7a596a53c2f22d97e48.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4528 downloadmr.exe 4528 downloadmr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 4528 1596 48791dc53c94b7a596a53c2f22d97e48.exe 92 PID 1596 wrote to memory of 4528 1596 48791dc53c94b7a596a53c2f22d97e48.exe 92 PID 1596 wrote to memory of 4528 1596 48791dc53c94b7a596a53c2f22d97e48.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\48791dc53c94b7a596a53c2f22d97e48.exe"C:\Users\Admin\AppData\Local\Temp\48791dc53c94b7a596a53c2f22d97e48.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\nsx4E31.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nsx4E31.tmp\downloadmr.exe /u4d488269-6268-4c29-b4c2-79305bc06ebe /e505832⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55ebc73650256e9c8ddbcda231db829a1
SHA1988d4535e18754ab2a6248abae96c5697d7dbcd5
SHA2561eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493
SHA512b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270
-
Filesize
93KB
MD5e15f3eb88d4a7e446c03bd97e72f18ce
SHA135fd11df8e7403819897a8268c1d1b0cfa87f274
SHA2566d4b7f2baf46df179a5b65f6579d787ba9f9fcffda0280f079bf9549c505f8c1
SHA512e22c2b08a1dcabd433a2a544ebb9c91bf990a0f852b1ba2391ef2a04c062a264fcc1c18252e996dcb8fb79588caf27f307755a4502911c8d11f850427f268f86