Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
50a012bcada57f7d29062dd7d6971145.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50a012bcada57f7d29062dd7d6971145.exe
Resource
win10v2004-20231215-en
General
-
Target
50a012bcada57f7d29062dd7d6971145.exe
-
Size
39KB
-
MD5
50a012bcada57f7d29062dd7d6971145
-
SHA1
9b10ee1d3db1ea121a6723c5c4611bb7945795d6
-
SHA256
dbefacd2cc609447edb1bef2cdb57d59b31ef2e36d0bdc1a87ca23bb48925247
-
SHA512
38bd0f624d2f1f4bf15cc5032e0c686e2611ef3f9e14104f9b8a73bd9d66e55eb6a6bf4e4e2c7ce3f24720b964416d255a0678cafafd138e6d28986f591bc365
-
SSDEEP
768:dnCHBjSfD0RDSjiN+WWrHcRtf55M4z54q+F5871mJMSJRnJnMQfNRI:8HFSfARDSW0HefHbmJHzI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 Au_.exe -
Loads dropped DLL 6 IoCs
pid Process 2444 50a012bcada57f7d29062dd7d6971145.exe 2444 50a012bcada57f7d29062dd7d6971145.exe 2736 Au_.exe 2736 Au_.exe 2736 Au_.exe 2736 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2736 2444 50a012bcada57f7d29062dd7d6971145.exe 28 PID 2444 wrote to memory of 2736 2444 50a012bcada57f7d29062dd7d6971145.exe 28 PID 2444 wrote to memory of 2736 2444 50a012bcada57f7d29062dd7d6971145.exe 28 PID 2444 wrote to memory of 2736 2444 50a012bcada57f7d29062dd7d6971145.exe 28 PID 2444 wrote to memory of 2736 2444 50a012bcada57f7d29062dd7d6971145.exe 28 PID 2444 wrote to memory of 2736 2444 50a012bcada57f7d29062dd7d6971145.exe 28 PID 2444 wrote to memory of 2736 2444 50a012bcada57f7d29062dd7d6971145.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\50a012bcada57f7d29062dd7d6971145.exe"C:\Users\Admin\AppData\Local\Temp\50a012bcada57f7d29062dd7d6971145.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD53f392a5d18b52cfa56536deb80fe3f13
SHA129b578d0fb9e0a44a34d4bc00c465f6b6b6dd29d
SHA2565d5fe2ba855c78f54c5c3ca1a88247a89eb5c480d757decc1bcdcb92f830040b
SHA512dfec9e8dcf9bc139586afd6811ca297a20a0d9d6ccd24058245acf3cf84aa6371c9b4b8c81c3e67af4ad4d2625b195ee3d1e2e869f3413f14bf47ad23f310c34
-
Filesize
39KB
MD550a012bcada57f7d29062dd7d6971145
SHA19b10ee1d3db1ea121a6723c5c4611bb7945795d6
SHA256dbefacd2cc609447edb1bef2cdb57d59b31ef2e36d0bdc1a87ca23bb48925247
SHA51238bd0f624d2f1f4bf15cc5032e0c686e2611ef3f9e14104f9b8a73bd9d66e55eb6a6bf4e4e2c7ce3f24720b964416d255a0678cafafd138e6d28986f591bc365