Analysis
-
max time kernel
139s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
53cc11257dab11a46b465d822619aa40.exe
Resource
win7-20231215-en
General
-
Target
53cc11257dab11a46b465d822619aa40.exe
-
Size
479KB
-
MD5
53cc11257dab11a46b465d822619aa40
-
SHA1
19337aea19eb9d3fbe2926a64a3b569ca1bd9326
-
SHA256
44a3212949b26fd86a39d30996778abf66c2d4c2b3003ffde65b14c43ca33a02
-
SHA512
a6b175babfeb49e132ad6e30635cdb4927572dd259a00ce35185efeb2f5dce366239536d522b2c496734ae35861bac9ce6c3444e6e89b1f9483aea20395457d0
-
SSDEEP
12288:rtOzkjUBvCkfmvz756FGtkeSUknzp7tRuvftbOb8:RwkjUV5a75G0OtXggb8
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3272 53cc11257dab11a46b465d822619aa40.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 53cc11257dab11a46b465d822619aa40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3272 53cc11257dab11a46b465d822619aa40.exe 3272 53cc11257dab11a46b465d822619aa40.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5cad20144ce29f20fecd6c21c5c61dead
SHA16bbaeb0aae32a3828cb77f8bfd3fb493803f3626
SHA256e68cb263198cf8cf93e5a60be4ff091606be78b0963aca0e519732187ea93e80
SHA51235e0f7c8cb13693d7e3a221f186bd72613544dc75e5355550bd0e7ed7054831258c5a487d20b412ce646313d24b3436baf10597baa8a359a319dbeee26580ad5
-
Filesize
55KB
MD5bb381e2d19d8eace86b34d20759491a5
SHA13dc9f7c2642efff4482e68c9d9df874bf98f5bcb
SHA256c8370a2d050359e9d505acc411e6f457a49b21360a21e6cbc9229bad3a767899
SHA512abb2ad8b111271a82a04362940a7ab9930883ecb33497a1c53edcdc49f0634af5bf5b1bc7095bd18db26d212b059aece4577f85040b5f49c4982b468fe973c12
-
Filesize
1KB
MD5f1cf73e00c240e9a4283201291d45a07
SHA1918c49cb6f1de521d91967b2508f19db1f38fea2
SHA25681bce5ff1003c9d5a688102d5d4c603841ed61c32628823dc48d560ec0d42cd2
SHA5122242892434a638a9344c87453c3d2a66a880278dcf66f1516f240131dca767248baf663ffc9365acad26550e5b20a742d8115d5976de3a094d0229d60844788f
-
Filesize
946B
MD5354dce57695e99df9e6faba76346496f
SHA1ca364e2daa4a80cfed7412b0f0374f1f82fa7146
SHA256bb39b6b14ae7f032922366943b342f58be120242020b1fa4dbb3310e39928823
SHA5128f34ae59e5502c70659e358d03709cfdfd01ec2128110932910e8de16888857896e86707c279b3f67edb54059a08ab6ce05b742342e825e2894580ae4a4639ee
-
Filesize
6KB
MD5682fea27f4c335defc18be6fb24d5748
SHA1d4a1743d63508d18af4be59232f3d266228648fb
SHA256928571317e90c4d6680931dffaaae85f382069be2bc72b875810ceb1f7c2744f
SHA512ef70ad8c291fe10c8b1d0dc060fc50b4593cf6fabc03a751aa62d5f4e375b1c80184337816a8e50430964960fc56324259f8833707320c7b757e388ecbd28341