Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
68d8e23335f0e78868c5c5f2ef0678c1.exe
Resource
win7-20231215-en
General
-
Target
68d8e23335f0e78868c5c5f2ef0678c1.exe
-
Size
876KB
-
MD5
68d8e23335f0e78868c5c5f2ef0678c1
-
SHA1
a44b17e9a19df7627627da842d23f0b16a26f53d
-
SHA256
1233519ec9f9da8eab1c97eefa5e447dc4f3baf1f6a65328b90c83449eba6405
-
SHA512
6caca0574c06b3caa0ff6a100cffba5d0555c51bf1df40d6a08a613b003837904ca0532c92ffe96b36a9e54de939162cdcde7c1161aa0be340e2fe1eadc689f5
-
SSDEEP
24576:e4MLKmtvPyHu75qudt0nx/y9pNg4W7HMnG3bOAHCXRl:JiKmHyOtdOp7sgi
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 920 68d8e23335f0e78868c5c5f2ef0678c1.exe 920 68d8e23335f0e78868c5c5f2ef0678c1.exe 920 68d8e23335f0e78868c5c5f2ef0678c1.exe 920 68d8e23335f0e78868c5c5f2ef0678c1.exe 920 68d8e23335f0e78868c5c5f2ef0678c1.exe 920 68d8e23335f0e78868c5c5f2ef0678c1.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 68d8e23335f0e78868c5c5f2ef0678c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2988 wrote to memory of 884 2988 68d8e23335f0e78868c5c5f2ef0678c1.exe 16 PID 2988 wrote to memory of 884 2988 68d8e23335f0e78868c5c5f2ef0678c1.exe 16 PID 2988 wrote to memory of 884 2988 68d8e23335f0e78868c5c5f2ef0678c1.exe 16 PID 884 wrote to memory of 920 884 68d8e23335f0e78868c5c5f2ef0678c1.exe 20 PID 884 wrote to memory of 920 884 68d8e23335f0e78868c5c5f2ef0678c1.exe 20 PID 884 wrote to memory of 920 884 68d8e23335f0e78868c5c5f2ef0678c1.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\68d8e23335f0e78868c5c5f2ef0678c1.exe"C:\Users\Admin\AppData\Local\Temp\68d8e23335f0e78868c5c5f2ef0678c1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\68d8e23335f0e78868c5c5f2ef0678c1.exe"C:\Users\Admin\AppData\Local\Temp\68d8e23335f0e78868c5c5f2ef0678c1.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\68d8e23335f0e78868c5c5f2ef0678c1.exe"C:\Users\Admin\AppData\Local\Temp\68d8e23335f0e78868c5c5f2ef0678c1.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5893d79932bc8122d31dd3a6b18be740c
SHA188cd8e21c906469b3c78c93787d4b612f2be711f
SHA2566622e0d1376889151e3d53223219ce9dfd6f19e88455876a497c266841245347
SHA512bd14767d91ea4af41f747b63690f2ba7e7ded4be79f10ef877147850c678f01c8b2efd0e6a4fbe14fb04c22be2b293c6d04d7b04c5f8c08685104d3eebd90d42
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854