Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
7ce9e567e31da7610bdf28d9dd9b0813.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ce9e567e31da7610bdf28d9dd9b0813.exe
Resource
win10v2004-20231215-en
General
-
Target
7ce9e567e31da7610bdf28d9dd9b0813.exe
-
Size
311KB
-
MD5
7ce9e567e31da7610bdf28d9dd9b0813
-
SHA1
cffaee511bf786ddc5f12d371e64453039777892
-
SHA256
24771493958cbc6f3306852a0b4641c86747c0d83059e4dff80a5b64eae2dd27
-
SHA512
734132d0e53605ac503672015580e1360ab1849395bb86725ff3471b7c82782c60938073134ad24ce1ea608706814a2929431fd83e400a9971b47d7b8a3c1b3b
-
SSDEEP
6144:SrVu6Y0JQBkQRl7174NpNUM+UHs+Jk5yZ0hbJDSKxFr1v:SrVu63yRl1uqM+gs++UZ0hbJDrJ1v
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2512 7ce9e567e31da7610bdf28d9dd9b0813.exe 2512 7ce9e567e31da7610bdf28d9dd9b0813.exe 2512 7ce9e567e31da7610bdf28d9dd9b0813.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 7ce9e567e31da7610bdf28d9dd9b0813.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7ce9e567e31da7610bdf28d9dd9b0813.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2512 7ce9e567e31da7610bdf28d9dd9b0813.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5f2b28b165747468c88ef4e1df60a6601
SHA10515cb22048f232872251630c28b97bcb4f18dda
SHA256be70bd6ea6c6c0779570a02324dc1fb8847a6202faf35efb9a189ef2f19138c4
SHA5129b0abea9158437a8c5ff422b5debeaf7600611efc4b845dffb3098884d3a090ecf3449b66b4051a9e1319141096a5542f0b6ba9454960561bff85be0a3f303ed
-
Filesize
2KB
MD5569a34adce4743e42b57e4676e7f15bb
SHA1424311ba2d2a675c74469cb531818cddd4a0e7b3
SHA256a019737903f6c748cc5619225a66dcba0d639dd5f7c838279408a621de2bc9a6
SHA51276cba3772f04a42212e2657f3f6f82a2f18915bb92017ba0b78cfb8fbb580e21c6d2258e7c77fe07a0d9468859c6f55d1d15fd786ad6c447c461a460bf88fcaf
-
Filesize
15KB
MD5e717f6ce3a7429bfa6d7f3cf66737a4b
SHA101f4042589b4ed88c351ffeac256be7a9d884818
SHA2567be720a73ba8b084702c89f64a9b295fad92545d6ba781072cc056823f9a7633
SHA51265a9a27430811aa01b55cf365f8b7b9f03e70d32ec60e0706242bc568242bcd493999dc1b02d92bf0d01c0095c8c38d30f282a998cafb80e60ad07e0d875ce80
-
Filesize
9KB
MD5882856e78f7e4d88f710939489d9f2bf
SHA1d04f87fe7e043c26affe19abf99d1d0328eba68d
SHA256cf1b8e85463a6da45c4762488c9af35e93e4461b2744c401ed58c9fdf1cfc10f
SHA5120be0837a0e663443aabbbd1bfeb71dca0cc9ab70783e56d61a9c298f2cba32ba67f2bc1e9ea9e188ae8313d7a6d1db88294d4e68404beb66ce746d6aa54d6451
-
Filesize
269KB
MD5af7ce801c8471c5cd19b366333c153c4
SHA14267749d020a362edbd25434ad65f98b073581f1
SHA256cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA51288655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c
-
Filesize
73KB
MD503d769619d455c3d192ffaef164b732b
SHA1a17181fcd3295901ff06bd82e833e3dee1dc8775
SHA256d9aec6fc72ccb4379e3448dbbd78ccac7ae21fa5c99f24317538b55685b65f74
SHA5127253db23fff9097224548dd8968a8fe937aa4338dfe99c00c6364124b5bd44d2d173b0d72e681718acda1ea981fe40faa40296285a046fe9ab0b16757c9e6ccb
-
Filesize
166KB
MD5b42b47edac51c5e0d4b794a321507e2c
SHA10bdb947de1f5905edc57bcb5cd43b08aef61536d
SHA256e4d58f05feb3752cf82e691924a08b7a47f51608ee879b876091af72c71f8bde
SHA51293cfb96c5e9e0538e9ccd506a98272bf44d1fdc55bd1bd17e8304b5e67ecb4bc0ff09b7606f13fcc3e753095515358d14fcc3c14b18f3e2cadb919d7206c1789