Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
f96dc4e71622af4b3fed11f51821ed80.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f96dc4e71622af4b3fed11f51821ed80.exe
Resource
win10v2004-20231222-en
General
-
Target
f96dc4e71622af4b3fed11f51821ed80.exe
-
Size
16KB
-
MD5
f96dc4e71622af4b3fed11f51821ed80
-
SHA1
f238ef004dcc02b20bb6cbfee549dddab0063edd
-
SHA256
c258ac295127e5c99467e19ac24520905ef1f8f5b28aa8e557ae113500053ef8
-
SHA512
010fc4d1d11eb2697de8942ff0de77dbd10a595d839b42a9c85a1e48a3943fd5af33accd2e7ab38fe294ec8479d0fa759a6b69e0965ba4409cc721400dc72868
-
SSDEEP
384:799bDFxWJfr7p03WMqj+o35eXrWhh+rglIFoN8aJZLB:R9nFxWJD7p038+o3qWhrNtr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1980 archive.exe -
Loads dropped DLL 2 IoCs
pid Process 2140 f96dc4e71622af4b3fed11f51821ed80.exe 2140 f96dc4e71622af4b3fed11f51821ed80.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Archive = "C:\\Program Files (x86)\\Archive\\archive.exe" archive.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Archive\archive.exe f96dc4e71622af4b3fed11f51821ed80.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1980 2140 f96dc4e71622af4b3fed11f51821ed80.exe 28 PID 2140 wrote to memory of 1980 2140 f96dc4e71622af4b3fed11f51821ed80.exe 28 PID 2140 wrote to memory of 1980 2140 f96dc4e71622af4b3fed11f51821ed80.exe 28 PID 2140 wrote to memory of 1980 2140 f96dc4e71622af4b3fed11f51821ed80.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f96dc4e71622af4b3fed11f51821ed80.exe"C:\Users\Admin\AppData\Local\Temp\f96dc4e71622af4b3fed11f51821ed80.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Archive\archive.exe"C:\Program Files (x86)\Archive\archive.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5f96dc4e71622af4b3fed11f51821ed80
SHA1f238ef004dcc02b20bb6cbfee549dddab0063edd
SHA256c258ac295127e5c99467e19ac24520905ef1f8f5b28aa8e557ae113500053ef8
SHA512010fc4d1d11eb2697de8942ff0de77dbd10a595d839b42a9c85a1e48a3943fd5af33accd2e7ab38fe294ec8479d0fa759a6b69e0965ba4409cc721400dc72868