Analysis
-
max time kernel
175s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 04:22
Static task
static1
Behavioral task
behavioral1
Sample
53b93ce49c85e86415969c3381a83089.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53b93ce49c85e86415969c3381a83089.exe
Resource
win10v2004-20231222-en
General
-
Target
53b93ce49c85e86415969c3381a83089.exe
-
Size
2.5MB
-
MD5
53b93ce49c85e86415969c3381a83089
-
SHA1
9eb02c75ab2f184ab20c3c3c4f849cd59605531e
-
SHA256
a0c82f2656dd45e63714b5fb3395ee85fc085d766548e4104fa6c428a9b51edd
-
SHA512
bcee02928fac5c55020a8596a99318a67ccf27ebbad5335f79f8ba2e4a8d67a32065a89f2bbc64cf1c10f4a4df823de50ffe13df0f3eeb44cc0885be3be6de1c
-
SSDEEP
49152:oky796EvMtTx435MtV+Oj29Ls3t/cwCxHHlc2KP1z8o/MO2Uqed3yBI1rH:o7AEvgVOy29Ls3JslVYzjMO26im
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2700 53b93ce49c85e86415969c3381a83089.tmp 2732 WMF.exe -
Loads dropped DLL 5 IoCs
pid Process 2880 53b93ce49c85e86415969c3381a83089.exe 2700 53b93ce49c85e86415969c3381a83089.tmp 2700 53b93ce49c85e86415969c3381a83089.tmp 2700 53b93ce49c85e86415969c3381a83089.tmp 2700 53b93ce49c85e86415969c3381a83089.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2732 WMF.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2700 2880 53b93ce49c85e86415969c3381a83089.exe 29 PID 2880 wrote to memory of 2700 2880 53b93ce49c85e86415969c3381a83089.exe 29 PID 2880 wrote to memory of 2700 2880 53b93ce49c85e86415969c3381a83089.exe 29 PID 2880 wrote to memory of 2700 2880 53b93ce49c85e86415969c3381a83089.exe 29 PID 2880 wrote to memory of 2700 2880 53b93ce49c85e86415969c3381a83089.exe 29 PID 2880 wrote to memory of 2700 2880 53b93ce49c85e86415969c3381a83089.exe 29 PID 2880 wrote to memory of 2700 2880 53b93ce49c85e86415969c3381a83089.exe 29 PID 2700 wrote to memory of 2732 2700 53b93ce49c85e86415969c3381a83089.tmp 30 PID 2700 wrote to memory of 2732 2700 53b93ce49c85e86415969c3381a83089.tmp 30 PID 2700 wrote to memory of 2732 2700 53b93ce49c85e86415969c3381a83089.tmp 30 PID 2700 wrote to memory of 2732 2700 53b93ce49c85e86415969c3381a83089.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\53b93ce49c85e86415969c3381a83089.exe"C:\Users\Admin\AppData\Local\Temp\53b93ce49c85e86415969c3381a83089.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\is-LN4LN.tmp\53b93ce49c85e86415969c3381a83089.tmp"C:\Users\Admin\AppData\Local\Temp\is-LN4LN.tmp\53b93ce49c85e86415969c3381a83089.tmp" /SL5="$4016E,2280122,153088,C:\Users\Admin\AppData\Local\Temp\53b93ce49c85e86415969c3381a83089.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\is-AV4T8.tmp\WMF.exe"C:\Users\Admin\AppData\Local\Temp\is-AV4T8.tmp\WMF.exe" /aid=0 /sub=0 /sid=42 /name="45.rar" /fid= /stats=6BMz7mxDTQUNpgijiDNnIJZog7fxDeuBKc4ef1AlCk8FrLFLRU4H9MeqJ72CH0OlmF2lmAjWG2SyXYHhzGSeNg== /param=03⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5845b85bec6d65e66309dd7e059bab5e3
SHA14bd779b563e6aa1bda9c5bf2dbef5a6dda0cf329
SHA2562fd7580f1e7cf0bd2d570dd49e4f601499ccf09983a030326f28ce5b6d480ef9
SHA5129b6d7d6f38d8ed2ca91882d01af37b0a4a888c1ff658dd0f230a8534a0e6c0f4adcbc8e5cd0a5786c9ff99bb6c29bc6c569c9a4ef21759f32bdd606346c4cb8e
-
Filesize
1.8MB
MD5d556a5734103f687a1ea4a7d82e47e02
SHA1ebd80ec6486d1bfb95248639af21e3907152aeb9
SHA2568aa38f72eb391c0d76af138cd4330e8b6a8b879edf2863801c116472061978ff
SHA51228c1793bf801dfe72d6daa76edb63f519e6dd138f3d88c00b6d86921e3d22b62992383aaa3dc6a0fb7f1ef3a71173482abc5f590034dff005a402ad133919185
-
Filesize
2KB
MD54c219b78a305d3e52c811542154bb224
SHA17efe3e383b29c808cfb3ad0fd90d627ea7b2b2bf
SHA256a0dbdc08f771e32a5ef06f47b436afb270e860578971a974db0c34c0c1366a7c
SHA512bced9584568b011c0b2013e48d6b9503f77b01c57e2049722326a40363ce42c533e590c4583cf0cf3a5391f3208db8135b5afdc27ae7359af3ded66b11e628b8
-
Filesize
2.9MB
MD55c45052710eb75f23c4007e4c8a4f906
SHA1dba20ea245f28118df0da5cfa2ff788ceedd9872
SHA256e454819d505e72d5af8043cb64b75bb64615bed160e0ef713af9c766a919110c
SHA512a052e488999ab65cfc518eca6f671e50f5a0987d2c737b8a7e9005f9a940d0cdaec01da0d6780624df85a3fdb05634f5220935493ba740eaeee457b6f7029adf
-
Filesize
2.0MB
MD5d5cef3dfe0ef5c78f31ef94b7537c478
SHA17dfed1a95258b4dc37624982bd2abc9a3233a4ee
SHA256f9595bd815febb110651381a29f29255964371f7315b2f04f0c6b2e85cea2f42
SHA512d3a4f2bbf94b40e7e3798ed0b818dfcd0aea8209d38d2f4e7d27bcd64e65be08306e73fc099b62d03b56ae14ec41f0aead897aadc27d5e9efc964c661f70114b
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.1MB
MD58811a0652c18dbcf68955f99df537eb8
SHA170cff6c43c0f873295dc085018639dff02f33012
SHA256d69f51e65e3944891ec9c392b3d7410d81f8f93e55b9071584bfd1d384862230
SHA512ed2ff6cfe272a8ae260233a1bb653adc0eaae13388418a9dea692b9924999d89b8677b8669fa24dcb0c606cfca7045bef779e1c58547f3f17d5096cbbe31d60a