Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 06:59
Static task
static1
Behavioral task
behavioral1
Sample
5b2aedc65960f45749e475568081efe8.exe
Resource
win7-20231129-en
General
-
Target
5b2aedc65960f45749e475568081efe8.exe
-
Size
877KB
-
MD5
5b2aedc65960f45749e475568081efe8
-
SHA1
fa1ded647f377b356c62d8a45de14a5e47a5b2da
-
SHA256
13482c7c9d4cb022bb5b5f1b9ec1d823327ac9736268809f75cf7c16883e9a31
-
SHA512
87f6a54d13df2e3bca13be78fb7b90ca31af9f534bcda2e1307d0881c586d608741892fb0dae00cb0f9e7525057903f75015cb84e125c29684750b6db7b40436
-
SSDEEP
24576:xVMLKmtvPyHu7Dytct6y9pNg4W7HM+G3bOAHCSK:jiKmHyOnUp7sVC
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2792 5b2aedc65960f45749e475568081efe8.exe 2792 5b2aedc65960f45749e475568081efe8.exe 2792 5b2aedc65960f45749e475568081efe8.exe 2792 5b2aedc65960f45749e475568081efe8.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5b2aedc65960f45749e475568081efe8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2264 1364 5b2aedc65960f45749e475568081efe8.exe 17 PID 1364 wrote to memory of 2264 1364 5b2aedc65960f45749e475568081efe8.exe 17 PID 1364 wrote to memory of 2264 1364 5b2aedc65960f45749e475568081efe8.exe 17 PID 1364 wrote to memory of 2264 1364 5b2aedc65960f45749e475568081efe8.exe 17 PID 1364 wrote to memory of 2264 1364 5b2aedc65960f45749e475568081efe8.exe 17 PID 1364 wrote to memory of 2264 1364 5b2aedc65960f45749e475568081efe8.exe 17 PID 1364 wrote to memory of 2264 1364 5b2aedc65960f45749e475568081efe8.exe 17 PID 2264 wrote to memory of 2792 2264 5b2aedc65960f45749e475568081efe8.exe 16 PID 2264 wrote to memory of 2792 2264 5b2aedc65960f45749e475568081efe8.exe 16 PID 2264 wrote to memory of 2792 2264 5b2aedc65960f45749e475568081efe8.exe 16 PID 2264 wrote to memory of 2792 2264 5b2aedc65960f45749e475568081efe8.exe 16 PID 2264 wrote to memory of 2792 2264 5b2aedc65960f45749e475568081efe8.exe 16 PID 2264 wrote to memory of 2792 2264 5b2aedc65960f45749e475568081efe8.exe 16 PID 2264 wrote to memory of 2792 2264 5b2aedc65960f45749e475568081efe8.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b2aedc65960f45749e475568081efe8.exe"C:\Users\Admin\AppData\Local\Temp\5b2aedc65960f45749e475568081efe8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\5b2aedc65960f45749e475568081efe8.exe"C:\Users\Admin\AppData\Local\Temp\5b2aedc65960f45749e475568081efe8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\5b2aedc65960f45749e475568081efe8.exe"C:\Users\Admin\AppData\Local\Temp\5b2aedc65960f45749e475568081efe8.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD51ddbe76d3276680a13d785ecf4e14b7e
SHA1b34c56d75a1d1d47d784b5bc4737315450154662
SHA256e172c5aa0feedeaae14098b2eb9e8c7f7f7eebb6a734b682c43135a118d30075
SHA51279a20ade94ab0de3879f487a324c65e38e36dca009662f325063b3a648730f6649a67aaffe0e798e7e0dd2882909198d9aaa26982106bdb940b5409b5b8528cb
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
11KB
MD54f170ae27bf7dfba6e852dc25c6b47b7
SHA1dbe9e7d7cc4723d2c63f544959001736ce7818d2
SHA2569d8930b6643ea20a4cfa0158b3561809bfe5fdcffd80ec05d5b1e29d9e6699f0
SHA512bb13763b6e29cc74f7db59db27caa8fbadb1c0181fdc43ffa44f0581d251c1caf8b56721491d8b974cb645a534733523ec5be7e307a1bab2af5f98499584520f
-
Filesize
82KB
MD533df5dd0ec754e5fc6786e10bde80c7d
SHA126b29348156163f242711ab6085b2f8332325eb0
SHA256c3683024bb16f0398d34b7b8715591fdcdddddb48773495ef369033ee25f1c6b
SHA512967f2c4ee7a933f2140d39d49c7c37fd6e3a110c65b15fa338a0a6805e56057c6b203218905f6c9ab826cf17926cfe34467d3ca9ffb5206816d1f83bf91ba0a3