Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 09:03
Static task
static1
Behavioral task
behavioral1
Sample
621398d3580180bebadd3809a72641f5.exe
Resource
win7-20231215-en
General
-
Target
621398d3580180bebadd3809a72641f5.exe
-
Size
877KB
-
MD5
621398d3580180bebadd3809a72641f5
-
SHA1
d073ebc5dd591c3e65590bded741857938934794
-
SHA256
2459011f4746e06007205ded2a9985e91ccf5661efae95698936c6cc8334b90f
-
SHA512
bad23eeeb8380305ec6cf599a6372f8cd8f6eb9e1bc034da1b3529d3e6b7baad3791c4fb27464424b1773e01cb2ef4bdf90de6ddaccb0f79dacf97680078c7d2
-
SSDEEP
24576:MYMLKmtvPyHu71iNpRiby9pNg4W7HMeG3bOAHCwg:niKmHyO0Pwp7s1S
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2072 621398d3580180bebadd3809a72641f5.exe 2072 621398d3580180bebadd3809a72641f5.exe 2072 621398d3580180bebadd3809a72641f5.exe 2072 621398d3580180bebadd3809a72641f5.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 621398d3580180bebadd3809a72641f5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1324 2300 621398d3580180bebadd3809a72641f5.exe 28 PID 2300 wrote to memory of 1324 2300 621398d3580180bebadd3809a72641f5.exe 28 PID 2300 wrote to memory of 1324 2300 621398d3580180bebadd3809a72641f5.exe 28 PID 2300 wrote to memory of 1324 2300 621398d3580180bebadd3809a72641f5.exe 28 PID 2300 wrote to memory of 1324 2300 621398d3580180bebadd3809a72641f5.exe 28 PID 2300 wrote to memory of 1324 2300 621398d3580180bebadd3809a72641f5.exe 28 PID 2300 wrote to memory of 1324 2300 621398d3580180bebadd3809a72641f5.exe 28 PID 1324 wrote to memory of 2072 1324 621398d3580180bebadd3809a72641f5.exe 29 PID 1324 wrote to memory of 2072 1324 621398d3580180bebadd3809a72641f5.exe 29 PID 1324 wrote to memory of 2072 1324 621398d3580180bebadd3809a72641f5.exe 29 PID 1324 wrote to memory of 2072 1324 621398d3580180bebadd3809a72641f5.exe 29 PID 1324 wrote to memory of 2072 1324 621398d3580180bebadd3809a72641f5.exe 29 PID 1324 wrote to memory of 2072 1324 621398d3580180bebadd3809a72641f5.exe 29 PID 1324 wrote to memory of 2072 1324 621398d3580180bebadd3809a72641f5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\621398d3580180bebadd3809a72641f5.exe"C:\Users\Admin\AppData\Local\Temp\621398d3580180bebadd3809a72641f5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\621398d3580180bebadd3809a72641f5.exe"C:\Users\Admin\AppData\Local\Temp\621398d3580180bebadd3809a72641f5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\621398d3580180bebadd3809a72641f5.exe"C:\Users\Admin\AppData\Local\Temp\621398d3580180bebadd3809a72641f5.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5fb60ba7ef530e0ec3844f0090dbeba80
SHA181bceda0455fa6733d9ff6023eb7a4add3f45da2
SHA256c9a466b02fcf12a9451581cc34b17711aebb208ef6d59a3a9352c400721f1f12
SHA512bb23caaaca156dc7a4ba46ebe5f0da443b6cbeaefc5beafb55762015c60f35f794e1ae2036fc95f69921401f91a9bf9590dc96415d60204e060de4a6a188b297
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD59a1841877cf77155597a8b97f8c2ce1b
SHA1d58e96337cd5a045e5c51ccf2dfb26f8b66d0a5d
SHA256894a9a91ef73dc006f58dba9c0bc15860b23c6994a82e0029d52914845ec1f96
SHA51218206c0c15e8eb956bbdcbdae893b907857fd2860fd247304f61663af5f69041b0594f380738b872cf8148b5f05d97918e6201c6d133c0397122664f80c8b583