Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
06d2792192341df6c5a14c31d7f44ffe.exe
Resource
win7-20231215-en
General
-
Target
06d2792192341df6c5a14c31d7f44ffe.exe
-
Size
876KB
-
MD5
06d2792192341df6c5a14c31d7f44ffe
-
SHA1
1a131e7ae88f1692fdf3bbe69efca42ce8760632
-
SHA256
f831d7c5c4e0709f3a11ef653b0566cfbb926cb91b1f5ce3bad63b9fb33bab73
-
SHA512
e48bffe0b1d6f7a59dab71581f0f472a810576d0e196cc11c19f38c1a397027b1ba383f05a9a2ee8b169493aa8408cf7e1d727f3623b82bdeb161659d6064e62
-
SSDEEP
24576:A6MLKmtvPyHu7StweGy9pNg4W7HMfG3bOAHC8jq:diKmHyOWtT4p7sI8
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1680 06d2792192341df6c5a14c31d7f44ffe.exe 1680 06d2792192341df6c5a14c31d7f44ffe.exe 1680 06d2792192341df6c5a14c31d7f44ffe.exe 1680 06d2792192341df6c5a14c31d7f44ffe.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 06d2792192341df6c5a14c31d7f44ffe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1800 wrote to memory of 3020 1800 06d2792192341df6c5a14c31d7f44ffe.exe 15 PID 1800 wrote to memory of 3020 1800 06d2792192341df6c5a14c31d7f44ffe.exe 15 PID 1800 wrote to memory of 3020 1800 06d2792192341df6c5a14c31d7f44ffe.exe 15 PID 1800 wrote to memory of 3020 1800 06d2792192341df6c5a14c31d7f44ffe.exe 15 PID 1800 wrote to memory of 3020 1800 06d2792192341df6c5a14c31d7f44ffe.exe 15 PID 1800 wrote to memory of 3020 1800 06d2792192341df6c5a14c31d7f44ffe.exe 15 PID 1800 wrote to memory of 3020 1800 06d2792192341df6c5a14c31d7f44ffe.exe 15 PID 3020 wrote to memory of 1680 3020 06d2792192341df6c5a14c31d7f44ffe.exe 14 PID 3020 wrote to memory of 1680 3020 06d2792192341df6c5a14c31d7f44ffe.exe 14 PID 3020 wrote to memory of 1680 3020 06d2792192341df6c5a14c31d7f44ffe.exe 14 PID 3020 wrote to memory of 1680 3020 06d2792192341df6c5a14c31d7f44ffe.exe 14 PID 3020 wrote to memory of 1680 3020 06d2792192341df6c5a14c31d7f44ffe.exe 14 PID 3020 wrote to memory of 1680 3020 06d2792192341df6c5a14c31d7f44ffe.exe 14 PID 3020 wrote to memory of 1680 3020 06d2792192341df6c5a14c31d7f44ffe.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\06d2792192341df6c5a14c31d7f44ffe.exe"C:\Users\Admin\AppData\Local\Temp\06d2792192341df6c5a14c31d7f44ffe.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1680
-
C:\Users\Admin\AppData\Local\Temp\06d2792192341df6c5a14c31d7f44ffe.exe"C:\Users\Admin\AppData\Local\Temp\06d2792192341df6c5a14c31d7f44ffe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3020
-
C:\Users\Admin\AppData\Local\Temp\06d2792192341df6c5a14c31d7f44ffe.exe"C:\Users\Admin\AppData\Local\Temp\06d2792192341df6c5a14c31d7f44ffe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD55dbff0f5700e6d294b86f3b66bbf7284
SHA1e21c966a3559cd79eaa129f4ab55332f254cb6a4
SHA256c2e795370bb488582976b3414d3240dcb6c60e561fbd72fddcc0d3e290137745
SHA5120742ae42f70fd598a4dd0cfd7b4e18c51149d69d53fab72786a6354771812257b56d08bacc3445632dba5762a46ce04b923243fdbd5928b54b49e948762af82f
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854