Analysis
-
max time kernel
71s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
742c3db6fcaa61d3f8ee1c00957107e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
742c3db6fcaa61d3f8ee1c00957107e6.exe
Resource
win10v2004-20231215-en
General
-
Target
742c3db6fcaa61d3f8ee1c00957107e6.exe
-
Size
94KB
-
MD5
742c3db6fcaa61d3f8ee1c00957107e6
-
SHA1
f6f19e674701f55016e2cff29a654b1e194000a5
-
SHA256
8f75f8714d54249720915fdba35679d5dbb8e1e670709009d9e2ba0dedf35255
-
SHA512
e10fe491a7f47cc0952673836d1d4760bb31bc4b2fd4965aecd0ad35702af59d4bd97d785fda93551b5e82322fdbea6751409b54de64cc392294022b26d86305
-
SSDEEP
1536:a1i4kWpQ0DtOTIQIs2qT44TLaAk3g3682zFNK4JX:a1i4kWi0xp7sj446Akwq82ZNZJ
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\38ECDE45-1300-43CF-80E6-3A5374966683 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\742c3db6fcaa61d3f8ee1c00957107e6.exe\"" 742c3db6fcaa61d3f8ee1c00957107e6.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\icx.dll 742c3db6fcaa61d3f8ee1c00957107e6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3584 4700 742c3db6fcaa61d3f8ee1c00957107e6.exe 22 PID 4700 wrote to memory of 3584 4700 742c3db6fcaa61d3f8ee1c00957107e6.exe 22 PID 4700 wrote to memory of 3584 4700 742c3db6fcaa61d3f8ee1c00957107e6.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\742c3db6fcaa61d3f8ee1c00957107e6.exe"C:\Users\Admin\AppData\Local\Temp\742c3db6fcaa61d3f8ee1c00957107e6.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\14E066AB.cmd2⤵PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263B
MD58e955fd3736f0ffec9a49e14e793856e
SHA1c668cccc134f00b8ce2881307d47f802836b388b
SHA256ec6ed4303c6a74668b1622e21d53fdb013ed12f574b819686276ce51f254ddeb
SHA512c5223dc8f4122a7dca226fe74df40d522fc5894ec3459ef6af377f1477de938c85877e5eadfc46b170dc0b1efcc9a90116e3b3757c234e4c45b97db8c198469c