Analysis
-
max time kernel
129s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 07:43
Static task
static1
Behavioral task
behavioral1
Sample
5d449ee5835c2030f059d689f056b4dc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5d449ee5835c2030f059d689f056b4dc.exe
Resource
win10v2004-20231215-en
General
-
Target
5d449ee5835c2030f059d689f056b4dc.exe
-
Size
142KB
-
MD5
5d449ee5835c2030f059d689f056b4dc
-
SHA1
f3e1f129a5c17ecbd767610b62dbd546eb4bac01
-
SHA256
41d58b7f0d526b668462d8e9a18ab3fa5aed130dffd4997b1ec77571acf0b485
-
SHA512
a79390e6d0f042a84e49336770a48844fcc3661c2a31d73dc13296e2cde88d355a335e61453f5ce328aac93b220860764d5c3d3bdef5ea66356ef6a77cc9408b
-
SSDEEP
3072:KnOn7t7XpdpCCTg/sxFgJ6eqgKJ+BCJCr7lNkvIIoQjvHmxrKDbuauSflfg:KKpdcCrTdgKYr5a4QjvHmxrcbHx6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4860 downloadmr.exe -
Loads dropped DLL 2 IoCs
pid Process 4036 5d449ee5835c2030f059d689f056b4dc.exe 4036 5d449ee5835c2030f059d689f056b4dc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4860 downloadmr.exe 4860 downloadmr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4036 wrote to memory of 4860 4036 5d449ee5835c2030f059d689f056b4dc.exe 20 PID 4036 wrote to memory of 4860 4036 5d449ee5835c2030f059d689f056b4dc.exe 20 PID 4036 wrote to memory of 4860 4036 5d449ee5835c2030f059d689f056b4dc.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d449ee5835c2030f059d689f056b4dc.exe"C:\Users\Admin\AppData\Local\Temp\5d449ee5835c2030f059d689f056b4dc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\nsu45A6.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nsu45A6.tmp\downloadmr.exe /u4d488269-6268-4c29-b4c2-79305bc06ebe /e19299862⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55ebc73650256e9c8ddbcda231db829a1
SHA1988d4535e18754ab2a6248abae96c5697d7dbcd5
SHA2561eaa543842df7795404184e8892a1654b0773dbc9bd8b54c7fdb9e68f4355493
SHA512b21266e76fc7263af982a1336a766e47ccf348ed56b305dbb09f03574c9b2a7309f12200e80d86f9a251381be6e87a41206447f11c51899cb31fba10da1d5270
-
Filesize
92KB
MD532ac35f4f41d4b0a9e176b8bf5d1b748
SHA10ebd9a543cf4c73a8ee9a1e39615cbfa7c161082
SHA256fb1108ad21ea2e314c8cd50d25c326c7b25d2f4d4c2ad51e6e06318072dd1c57
SHA51277c074dc3cd9b088fdad0e55d208727edd5d0f5b66e2ec4731fd8bdfcdf0d8b97fb543bce4a6658389ec4153a5a371ec3e67eb10e90cb910b76cec70ba39d9c9