Analysis
-
max time kernel
170s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 07:40
Static task
static1
Behavioral task
behavioral1
Sample
5d1f38cf355b4a118b83fa5b881f327f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5d1f38cf355b4a118b83fa5b881f327f.exe
Resource
win10v2004-20231215-en
General
-
Target
5d1f38cf355b4a118b83fa5b881f327f.exe
-
Size
60KB
-
MD5
5d1f38cf355b4a118b83fa5b881f327f
-
SHA1
62982aef390a93e295bd1bc9824baad7905568a9
-
SHA256
cf3d7a91aec590f5edd94355f3c7e8e80ec3a06ed12d04306ab2dd214051539f
-
SHA512
8030a78dafec0a9484b6b08df3c2092dcc32bea297ebdea55e6d875c89c23e2c872c0e3f39b05784b5e975cdb1209ad811be1c85b515c2c293c5eb609b79077c
-
SSDEEP
768:th/aMCuumMOqgug7VnYxKWuENXvekvI5JhojaWeBZwVzlDJ28TqWyoZ0oRcg9:tDCunVnLWFvI7mOWeBZwBlDYBodRcg9
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iexpand.exe = "iexpand.exe" 5d1f38cf355b4a118b83fa5b881f327f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\IEXPAND.EXE 5d1f38cf355b4a118b83fa5b881f327f.exe File opened for modification C:\WINDOWS\SysWOW64\IEXPAND.EXE 5d1f38cf355b4a118b83fa5b881f327f.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4064 5d1f38cf355b4a118b83fa5b881f327f.exe 4064 5d1f38cf355b4a118b83fa5b881f327f.exe 4064 5d1f38cf355b4a118b83fa5b881f327f.exe 4064 5d1f38cf355b4a118b83fa5b881f327f.exe 4064 5d1f38cf355b4a118b83fa5b881f327f.exe 4064 5d1f38cf355b4a118b83fa5b881f327f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d1f38cf355b4a118b83fa5b881f327f.exe"C:\Users\Admin\AppData\Local\Temp\5d1f38cf355b4a118b83fa5b881f327f.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4064 -
C:\WINDOWS\SysWOW64\IEXPAND.EXE"C:\WINDOWS\SYSTEM32\IEXPAND.EXE" C:\Users\Admin\AppData\Local\Temp\5d1f38cf355b4a118b83fa5b881f327f.exe2⤵PID:3392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD55d1f38cf355b4a118b83fa5b881f327f
SHA162982aef390a93e295bd1bc9824baad7905568a9
SHA256cf3d7a91aec590f5edd94355f3c7e8e80ec3a06ed12d04306ab2dd214051539f
SHA5128030a78dafec0a9484b6b08df3c2092dcc32bea297ebdea55e6d875c89c23e2c872c0e3f39b05784b5e975cdb1209ad811be1c85b515c2c293c5eb609b79077c
-
Filesize
17KB
MD548954503e62d4b8dc61a7a054f1f2cdd
SHA11ee4e0b471213fa938142b0038573da98299306f
SHA256ecd6aaaf0791f9afbcb711955a2c440fdbc6efd63dec0b7720b82579537008ed
SHA5125249140121be8b74559110ef4be7fb53354f81dc13b0210829e800b369bbf6f9be88ea00a5283a40c06108136267f58230787d8b5824e2d319b6c7f218b7f9e6
-
Filesize
10KB
MD58f14bf3a76fee6d0b10246446bc67a89
SHA10292eb5e261f66496ca67379511fe0f514872c9f
SHA256286b5a87d4cb5059eb5c630c633b23f62b3579ef66771cbe5f047e6f6aba4883
SHA512ac3a3786afa8016ba85c0209feef6e45ba8e40f2c8f378b2ffe925d35abb2d60cc427e2fcd4d74ab7d663f90eb816aa44455da8ee4024f2dfd421254f5feb319