Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 20:15
Behavioral task
behavioral1
Sample
02c4553c4a782f664b9d47a1e52e9f29.exe
Resource
win7-20231129-en
General
-
Target
02c4553c4a782f664b9d47a1e52e9f29.exe
-
Size
2.3MB
-
MD5
02c4553c4a782f664b9d47a1e52e9f29
-
SHA1
394a616fea616406c3ab12f40acf59332500d7ee
-
SHA256
228db4eac5d27e4a4debc380f5443ee20d5f75f39418a30889ff80ad5338ee79
-
SHA512
6b5026d4822c60732d6c565061ac2d822095eab2ce411b68109d39086fb85bfb319a40e22e6711672e598e6477a755944a2477b45cdb95370864add27f861bbd
-
SSDEEP
49152:o4erXlb7BZfdsB1icGIhrZ8pqSjO/CRctRYQdYRAS3JcU76TR84BXpPKvD3odEaO:4ZfW1BGID83S/CRkFYRNh2VBMv7odE9f
Malware Config
Signatures
-
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 4768 02c4553c4a782f664b9d47a1e52e9f29.exe -
resource yara_rule behavioral2/memory/3284-0-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect behavioral2/memory/3284-1-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect behavioral2/memory/4768-7-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect behavioral2/memory/4768-9-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect behavioral2/memory/3284-22-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect behavioral2/memory/4768-30-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect behavioral2/memory/4768-31-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect behavioral2/memory/3284-32-0x00000000006D0000-0x0000000000BC3000-memory.dmp vmprotect -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe 4768 02c4553c4a782f664b9d47a1e52e9f29.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3284 wrote to memory of 4768 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 37 PID 3284 wrote to memory of 4768 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 37 PID 3284 wrote to memory of 4768 3284 02c4553c4a782f664b9d47a1e52e9f29.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c4553c4a782f664b9d47a1e52e9f29.exe"C:\Users\Admin\AppData\Local\Temp\02c4553c4a782f664b9d47a1e52e9f29.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\02c4553c4a782f664b9d47a1e52e9f29.exeC:\Users\Admin\AppData\Local\Temp\02c4553c4a782f664b9d47a1e52e9f29.exe /SECONDSTAGE /Mutex=TSMtx21664 /PIXGUID=99999999-9999-4323-9d97-85d4d9cc71062⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
678KB
MD546b655f78d090d11b22054bf312f7c04
SHA12b401388fa2b5d839bd884a6e20014755ffef186
SHA25624b31fb8a7f3db9e0518429c6809ad720b72f703014d141435062789de499495
SHA512e2594143918f62e8bf094ace2bbd47fe368ad973c85531a8e759074df717534879bf336e83bfa39acdea7c1f425bd2177c2cd684b37c6f6af5599aada7f4bf45