Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
0601c797c8fe9b094cdad176b9a2bec4.exe
Resource
win7-20231215-en
General
-
Target
0601c797c8fe9b094cdad176b9a2bec4.exe
-
Size
876KB
-
MD5
0601c797c8fe9b094cdad176b9a2bec4
-
SHA1
e564e761a84fa4a808527bf936afe806198078df
-
SHA256
ea421814754bf78616c7340563750622c7df98ecdf1df790d1f73e93a359668f
-
SHA512
b5411baa8bb547534c36b0fba7a0981298dec9c7559dcb32b3f5a828e4c86cd652e486c1aaa40c85718dc224df09f9b9131751a5688fd4679a95862213113d51
-
SSDEEP
24576:eOMLKmtvPyHu7DyiOy9pNg4W7HMAG3bOAHCS8zd:HiKmHyOn6p7sPs
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 3212 0601c797c8fe9b094cdad176b9a2bec4.exe 3212 0601c797c8fe9b094cdad176b9a2bec4.exe 3212 0601c797c8fe9b094cdad176b9a2bec4.exe 3212 0601c797c8fe9b094cdad176b9a2bec4.exe 3212 0601c797c8fe9b094cdad176b9a2bec4.exe 3212 0601c797c8fe9b094cdad176b9a2bec4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0601c797c8fe9b094cdad176b9a2bec4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4364 wrote to memory of 5116 4364 0601c797c8fe9b094cdad176b9a2bec4.exe 23 PID 4364 wrote to memory of 5116 4364 0601c797c8fe9b094cdad176b9a2bec4.exe 23 PID 4364 wrote to memory of 5116 4364 0601c797c8fe9b094cdad176b9a2bec4.exe 23 PID 5116 wrote to memory of 3212 5116 0601c797c8fe9b094cdad176b9a2bec4.exe 22 PID 5116 wrote to memory of 3212 5116 0601c797c8fe9b094cdad176b9a2bec4.exe 22 PID 5116 wrote to memory of 3212 5116 0601c797c8fe9b094cdad176b9a2bec4.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\0601c797c8fe9b094cdad176b9a2bec4.exe"C:\Users\Admin\AppData\Local\Temp\0601c797c8fe9b094cdad176b9a2bec4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\0601c797c8fe9b094cdad176b9a2bec4.exe"C:\Users\Admin\AppData\Local\Temp\0601c797c8fe9b094cdad176b9a2bec4.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\0601c797c8fe9b094cdad176b9a2bec4.exe"C:\Users\Admin\AppData\Local\Temp\0601c797c8fe9b094cdad176b9a2bec4.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5c6ebad4112d5c06893e9d4bb6d78c8f8
SHA155c9aad03472b2c5e90a2dd409a424b971b30e6f
SHA256c8f2cc3598bc74bcd47cf362f4e5a8e4798544ba2d79191f10853e529837d9a7
SHA512664ebf7105a968263225b59d87533e8cd83172a6759385e2a1be9bf992047b20207b208c77c1f1432e8f897442f8a3a848f515476ed00ef083a4435e16db65de
-
Filesize
10KB
MD55efa988db4154ff7f442b7c41a8157d9
SHA127af6a51e4c6d40a2d47991145095fb145af81b6
SHA25654b49f87edc35b4d24ddbd468a73979dfa695e1c47a3ee4917953936856e2ce0
SHA512b9e2d81c2246610b4856219487e780429e643af040869b98d77c43105ba7abf06173047da515b4072d4d098eb811a289b94be7663f1cd7d999def23d35869760
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
30KB
MD5b0843e2dbb2f4d78b2f822a5bfb85f28
SHA14fdd4ef9b872fdaebd7b8c9a73687ebce0863b09
SHA2566098983a0a1e8cf264cee68c25acd407261d43c49bc6b799f2d49205a499ded8
SHA512b6bf900ba37e2f91cda11c687360a69c26b56ff9f171b87ea81fee2d677fcbb1db0ffcc05d18c96ba3370fe056b7ae88f53bd26f0f24f22fe48642c270bc0f70
-
Filesize
81KB
MD599641b534649b0efcbb8bfe51839bb0b
SHA132d8006de8e0239967a21df6638d0febdb84d766
SHA256052a7affd913e850384bf7a04cbf60c8867a90f4d5b3a46fbb8265abd3465017
SHA51265c3b02ab895739d36616bd6483a834e098e679bad76659bf8cd12552acf8339da22ce52fb1bf42df16afa4fe87a92630019033e1b428af0e013984add4ccba3
-
Filesize
45KB
MD56cb86ba2809d5391cbdc6adb892b40ac
SHA138b679b390bdda51a6ccd5365cfaac8401baf8f4
SHA256d1d21e24d48ebec259249880d5eb6d374f81e425316e487ef84274492f810b1e
SHA5121c7a9af8ac46504f90277cee428a63afbe9bf91c065dfcebdef403b6b6450c46a5ed81063200216c96bf56847fb2b875249bc6fb26a222fc8096eb499ccf0e0f