Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 18:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
010bf8fe8128591c079451129cc006ae.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
010bf8fe8128591c079451129cc006ae.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
010bf8fe8128591c079451129cc006ae.exe
-
Size
6.8MB
-
MD5
010bf8fe8128591c079451129cc006ae
-
SHA1
d741d589fd196a7edf54cc5ffbdfcc821b491d62
-
SHA256
f974131c828bce47dc4ac13f200a2720adf2270f40d871daf24204f499ca3cd8
-
SHA512
f25050da99397aeb707ca3c51670abe8c7927d048ff8a08f6d2a17df066aff2778eac0760ff5f1caf641d5feb67f4ff4df64eb04bcd819ae69c11b7fb7db87f1
-
SSDEEP
98304:4e3lN+zl7pDS7iPttNrRMRCJhH/YikuZrzXg0CSvITM5t6jicXx4vRM:L33+TZRMRSp/YR4XgIbYLXx4q
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2996 power.exe 2588 power.exe 1204 Process not Found -
Loads dropped DLL 3 IoCs
pid Process 1728 010bf8fe8128591c079451129cc006ae.exe 2996 power.exe 2588 power.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2996 1728 010bf8fe8128591c079451129cc006ae.exe 29 PID 1728 wrote to memory of 2996 1728 010bf8fe8128591c079451129cc006ae.exe 29 PID 1728 wrote to memory of 2996 1728 010bf8fe8128591c079451129cc006ae.exe 29 PID 1728 wrote to memory of 2996 1728 010bf8fe8128591c079451129cc006ae.exe 29 PID 2996 wrote to memory of 2588 2996 power.exe 30 PID 2996 wrote to memory of 2588 2996 power.exe 30 PID 2996 wrote to memory of 2588 2996 power.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\010bf8fe8128591c079451129cc006ae.exe"C:\Users\Admin\AppData\Local\Temp\010bf8fe8128591c079451129cc006ae.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\power.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\power.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\power.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\power.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2656