Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
mwVGb4WU.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
mwVGb4WU.exe
Resource
win10v2004-20231215-en
General
-
Target
mwVGb4WU.exe
-
Size
753KB
-
MD5
555fbf1135687a8cf1d630baaa6e171b
-
SHA1
5bc6237d0e04747b593ef279e198a48b2dc1f763
-
SHA256
83201d85f85f870c65c3e40e712313fb3764cab64691fcd60a2a466019b2c4fa
-
SHA512
ffffc24d789b6656a8cdf892369cc5534d4cd7df4dc41d52c9e57f643082b97cef89f95d919bfcc53568b6805e184f02ee9da227861791c1de632e3869c516c0
-
SSDEEP
12288:aMSApJVYG5lDLyjsb0eOzkv4R7QnvUUilQ35+6G75V9Ilr:ansJ39LyjbJkQFMhmC+6GD9K
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Synaptics.exepid Process 2308 Synaptics.exe -
Loads dropped DLL 2 IoCs
Processes:
mwVGb4WU.exepid Process 1584 mwVGb4WU.exe 1584 mwVGb4WU.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
mwVGb4WU.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" mwVGb4WU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
mwVGb4WU.exedescription pid Process procid_target PID 1584 wrote to memory of 2308 1584 mwVGb4WU.exe 28 PID 1584 wrote to memory of 2308 1584 mwVGb4WU.exe 28 PID 1584 wrote to memory of 2308 1584 mwVGb4WU.exe 28 PID 1584 wrote to memory of 2308 1584 mwVGb4WU.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\mwVGb4WU.exe"C:\Users\Admin\AppData\Local\Temp\mwVGb4WU.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5346adb9e02ed5b26155696794bde73b7
SHA1b05b9e7d0d4817058fcf0cbc37b3423eeb264aba
SHA25674a0e4b668c5905d92dd625e9b138515603d49e25d16f9da8b31b451d46f6259
SHA5121e6630248b7abc379bc066c17c7aa94d56fa4b2e9254bec86580477b09f5706d4c2b05e6612d6b69e7135aeb740196161dea034fc6273d7c6fdd67aaf700aac9
-
Filesize
753KB
MD5555fbf1135687a8cf1d630baaa6e171b
SHA15bc6237d0e04747b593ef279e198a48b2dc1f763
SHA25683201d85f85f870c65c3e40e712313fb3764cab64691fcd60a2a466019b2c4fa
SHA512ffffc24d789b6656a8cdf892369cc5534d4cd7df4dc41d52c9e57f643082b97cef89f95d919bfcc53568b6805e184f02ee9da227861791c1de632e3869c516c0
-
Filesize
680KB
MD50aa98b6193bde4920370900e232e29d2
SHA1fe2ba32d4c1bee2f2e45898d04f9deedae7c058a
SHA256c6830cb8b605747eef2373bca6a0cfb3b3403dedad1be33186cbf766c7095274
SHA5121685748373efdba7d0ffac693ef4d82621cdbcd9bc20894091bca7e373977ac363764bd90588a115885ec805562ee3b3c149684e67815c1bf24b9b37f85a759a