Analysis
-
max time kernel
174s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 08:23
Static task
static1
Behavioral task
behavioral1
Sample
5f7e1683ca4403249b6aa71a200d17ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5f7e1683ca4403249b6aa71a200d17ac.exe
Resource
win10v2004-20231215-en
General
-
Target
5f7e1683ca4403249b6aa71a200d17ac.exe
-
Size
321KB
-
MD5
5f7e1683ca4403249b6aa71a200d17ac
-
SHA1
de4c1187bb888e1fdae97842918883d35e7166c8
-
SHA256
169a1a8de7208ce525f8640ba1ca4a25f1098914f743a33020b186a8271efc66
-
SHA512
c898f49b2246d7d155afe6cbf267956ca0b10b15f644b01360bd43dd7cbff5155284661e0dc1b6c1da9c6cd4cfe2df9c8935a72756dc34659de1640fcabd8e85
-
SSDEEP
6144:5rIv1va9uEo2S1YnQmCX492DkwNP3qpYFp6UwkkZTyqCcbVdgXqUt4JRZ0nNMKi9:5rIv1qu6/eIo4EwTmq9dgXb4JRMNHi3N
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 904 5f7e1683ca4403249b6aa71a200d17ac.exe 904 5f7e1683ca4403249b6aa71a200d17ac.exe 904 5f7e1683ca4403249b6aa71a200d17ac.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 5f7e1683ca4403249b6aa71a200d17ac.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum 5f7e1683ca4403249b6aa71a200d17ac.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 904 5f7e1683ca4403249b6aa71a200d17ac.exe 904 5f7e1683ca4403249b6aa71a200d17ac.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 904 wrote to memory of 2316 904 5f7e1683ca4403249b6aa71a200d17ac.exe 94 PID 904 wrote to memory of 2316 904 5f7e1683ca4403249b6aa71a200d17ac.exe 94 PID 904 wrote to memory of 2316 904 5f7e1683ca4403249b6aa71a200d17ac.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f7e1683ca4403249b6aa71a200d17ac.exe"C:\Users\Admin\AppData\Local\Temp\5f7e1683ca4403249b6aa71a200d17ac.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\_tinFFFE.bat"2⤵PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5f2b28b165747468c88ef4e1df60a6601
SHA10515cb22048f232872251630c28b97bcb4f18dda
SHA256be70bd6ea6c6c0779570a02324dc1fb8847a6202faf35efb9a189ef2f19138c4
SHA5129b0abea9158437a8c5ff422b5debeaf7600611efc4b845dffb3098884d3a090ecf3449b66b4051a9e1319141096a5542f0b6ba9454960561bff85be0a3f303ed
-
Filesize
269KB
MD5af7ce801c8471c5cd19b366333c153c4
SHA14267749d020a362edbd25434ad65f98b073581f1
SHA256cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA51288655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c
-
Filesize
50B
MD57b8fe7565899b0d397508ed71eb89d4c
SHA1ca011e88128a7d1d94e836df05d1236368f5ef68
SHA256f5d89018cce2d736b33c037abc3012f2fab1139d1b19916dd2bdb19ef80fb331
SHA5128070b04148d8017731931362b22d2deaefe32e131497c74ee241fd07f375013edf8e7c952344a44e0bea134e01f3ff9e2793f384131ba325bd878596ddbc5a7a
-
Filesize
73KB
MD562c8a55c003044bc4810bc2db3e514c3
SHA10bcc928b4d0ab8c62b31fa026ecb8fa43629c7ae
SHA256ad0b22b2a4d5e125517e1440207b96e9a6640f3c80c934f045df466d36388e14
SHA51264a05460c4e5bc140b91d369a733745eb00a095d1ef0a83fb3ed8f4693ace77e0b7eea170b98d4f599ed50635cb993a6dad468f0fbbdc18281a746142df6f5c8
-
Filesize
2KB
MD5afcf1dd833afa7aee9036b81f804e938
SHA11c86863ac16d1d2dc489906b02c1e7b3d045c3fa
SHA256f67c73626eb69628860edcfed782dc57570e34c6aab53132fa2653c4263c4b5a
SHA512f2529427706608b8e39acb0a97b44353ed12e4546bed1ed2997493069a8aefcdb2488853d5237aba8ab5bb82091274b712bf2cce75378fd5e605b26b1c0b928f
-
Filesize
15KB
MD5e717f6ce3a7429bfa6d7f3cf66737a4b
SHA101f4042589b4ed88c351ffeac256be7a9d884818
SHA2567be720a73ba8b084702c89f64a9b295fad92545d6ba781072cc056823f9a7633
SHA51265a9a27430811aa01b55cf365f8b7b9f03e70d32ec60e0706242bc568242bcd493999dc1b02d92bf0d01c0095c8c38d30f282a998cafb80e60ad07e0d875ce80
-
Filesize
18KB
MD5d770a03b797211a6565c286b80747436
SHA1debd3c69f90244ee2ce1173918bb7945d0834709
SHA2568bd4e3e5c3a0b24c720979b6e33450ed58996438ac5a82fb1dd40b4bcba63627
SHA5121456c3a0746dae9f9d842e04faac060ee19c4ec3f23f20a44e0331ef49768b4e68835d6df5b0faabc722a78ccfca7b9a16419e2296af5ff2cce09f89a50c2720
-
Filesize
180KB
MD510a45f1ab43c12615706a95b6d5406cb
SHA13bce9901f02460e6e9174cc5f4b7b07eafecea81
SHA25686e17751c8c63422b06809136252867ac47684956327c42804905447ddbf62f1
SHA5120e16bc6976f942eea6516b59048c509ffde8ab357e2f62e4733f2c0a4083d97b28d6d70aa30d0713bb5a0eb0d860efcf54a55623fa20e93ad93c9db332b9d2cd