Analysis
-
max time kernel
8s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
7439e381dd0f661b2c337ec55024dced.exe
Resource
win7-20231215-en
General
-
Target
7439e381dd0f661b2c337ec55024dced.exe
-
Size
875KB
-
MD5
7439e381dd0f661b2c337ec55024dced
-
SHA1
2d1a4c8be66d651832b2da804b2d842f2b06bba1
-
SHA256
24ace6947c0961244fd9bb63233b000e03d03d9d6c2e0abc275b7a9d81188279
-
SHA512
c3d869a59dcaad6ea3cd49a26619dbcc2d4c3aea44eddb5b8c41b7f0241f97dfef6a4ece63aed3f646f745cf56f6ae57b1fc35920da68b7e0265fe5308ece46a
-
SSDEEP
24576:rgMLKmtvPyHu7EtwNy9pNg4W7HM8wcN+2QHCeM:EiKmHyOotAp7s8NQY
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 796 7439e381dd0f661b2c337ec55024dced.exe 796 7439e381dd0f661b2c337ec55024dced.exe 796 7439e381dd0f661b2c337ec55024dced.exe 796 7439e381dd0f661b2c337ec55024dced.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7439e381dd0f661b2c337ec55024dced.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1520 1268 7439e381dd0f661b2c337ec55024dced.exe 17 PID 1268 wrote to memory of 1520 1268 7439e381dd0f661b2c337ec55024dced.exe 17 PID 1268 wrote to memory of 1520 1268 7439e381dd0f661b2c337ec55024dced.exe 17 PID 1268 wrote to memory of 1520 1268 7439e381dd0f661b2c337ec55024dced.exe 17 PID 1268 wrote to memory of 1520 1268 7439e381dd0f661b2c337ec55024dced.exe 17 PID 1268 wrote to memory of 1520 1268 7439e381dd0f661b2c337ec55024dced.exe 17 PID 1268 wrote to memory of 1520 1268 7439e381dd0f661b2c337ec55024dced.exe 17 PID 1520 wrote to memory of 796 1520 7439e381dd0f661b2c337ec55024dced.exe 16 PID 1520 wrote to memory of 796 1520 7439e381dd0f661b2c337ec55024dced.exe 16 PID 1520 wrote to memory of 796 1520 7439e381dd0f661b2c337ec55024dced.exe 16 PID 1520 wrote to memory of 796 1520 7439e381dd0f661b2c337ec55024dced.exe 16 PID 1520 wrote to memory of 796 1520 7439e381dd0f661b2c337ec55024dced.exe 16 PID 1520 wrote to memory of 796 1520 7439e381dd0f661b2c337ec55024dced.exe 16 PID 1520 wrote to memory of 796 1520 7439e381dd0f661b2c337ec55024dced.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\7439e381dd0f661b2c337ec55024dced.exe"C:\Users\Admin\AppData\Local\Temp\7439e381dd0f661b2c337ec55024dced.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\7439e381dd0f661b2c337ec55024dced.exe"C:\Users\Admin\AppData\Local\Temp\7439e381dd0f661b2c337ec55024dced.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\7439e381dd0f661b2c337ec55024dced.exe"C:\Users\Admin\AppData\Local\Temp\7439e381dd0f661b2c337ec55024dced.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5bcbe6719f6926081535a338038978200
SHA116ea039986e3ad9386a8f49b13d8d104933ed80b
SHA2566b58e1d705c3edabfcce81d3e36e0ae4c9650ea3d8034d53775d0d9d863b95a4
SHA512a110060f00ef350c19471d6dff596a15137b1807ae68b73346e2290140583306093c913e7afb935e49618f41b1e3b97ee00e0ac5ff4af107aca508c29c2f7660
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD563f534de4d35212c9ab5df430cfa8b7d
SHA1079eab205e0ddcc89286f2b866eafe6ade36100d
SHA256dfbf50ad0588800c617599ed021cb9a7d55b2afb7b1426d8042c3683298dc5c5
SHA51295c7f77b2915020093226335b305b2456611eb6f2ffc2807733d52c6e97a0e1fcd34cd68f8dbaf5fa19e4cb4f4f2ffa9907505cee8fb417da0dd1a419c93978f