Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
091a8d4328fb747b6763f39f2afb6fab.exe
Resource
win7-20231215-en
General
-
Target
091a8d4328fb747b6763f39f2afb6fab.exe
-
Size
877KB
-
MD5
091a8d4328fb747b6763f39f2afb6fab
-
SHA1
937048fff666eb21f9bdb6ee6ae69301d9adc428
-
SHA256
12c2e12ac5b57f8ce67e5176a0888dbe033c012186ce77a36afd47c798de2348
-
SHA512
4dda40d55d9390c1207b5a55e41590e0ca35a34660e6e9a928cd005b44258a74c468b1ae854e9ee81b694b938a050f2d77f180b1bc08a3aff583b20da7e011d7
-
SSDEEP
24576:BrMLKmtvPyHu7gChEr0y9pNg4W7HMcYcN+2QHCHW5:9iKmHyOAKp7sclQH
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2512 091a8d4328fb747b6763f39f2afb6fab.exe 2512 091a8d4328fb747b6763f39f2afb6fab.exe 2512 091a8d4328fb747b6763f39f2afb6fab.exe 2512 091a8d4328fb747b6763f39f2afb6fab.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 091a8d4328fb747b6763f39f2afb6fab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1304 2040 091a8d4328fb747b6763f39f2afb6fab.exe 28 PID 2040 wrote to memory of 1304 2040 091a8d4328fb747b6763f39f2afb6fab.exe 28 PID 2040 wrote to memory of 1304 2040 091a8d4328fb747b6763f39f2afb6fab.exe 28 PID 2040 wrote to memory of 1304 2040 091a8d4328fb747b6763f39f2afb6fab.exe 28 PID 2040 wrote to memory of 1304 2040 091a8d4328fb747b6763f39f2afb6fab.exe 28 PID 2040 wrote to memory of 1304 2040 091a8d4328fb747b6763f39f2afb6fab.exe 28 PID 2040 wrote to memory of 1304 2040 091a8d4328fb747b6763f39f2afb6fab.exe 28 PID 1304 wrote to memory of 2512 1304 091a8d4328fb747b6763f39f2afb6fab.exe 29 PID 1304 wrote to memory of 2512 1304 091a8d4328fb747b6763f39f2afb6fab.exe 29 PID 1304 wrote to memory of 2512 1304 091a8d4328fb747b6763f39f2afb6fab.exe 29 PID 1304 wrote to memory of 2512 1304 091a8d4328fb747b6763f39f2afb6fab.exe 29 PID 1304 wrote to memory of 2512 1304 091a8d4328fb747b6763f39f2afb6fab.exe 29 PID 1304 wrote to memory of 2512 1304 091a8d4328fb747b6763f39f2afb6fab.exe 29 PID 1304 wrote to memory of 2512 1304 091a8d4328fb747b6763f39f2afb6fab.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD595d3c812e207a8af8564917f053562b5
SHA1473c2e4f725a84bcb5f8b51586407e46ccc01ef9
SHA256ecae4c2b69438769dfb4a747fe2402e031eaf6d097af976123350cea3063bdc4
SHA51259b8447824440b691176b941b84e38139bdcb2e6715ecafca17fae3eea58f202893ee9b320c780b931bbd975d39a99b8bb4390da1973ade88d139380b1cf86bb
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD546972a016ed397cc25b8de4e9c510227
SHA108def924894c143d71c79712362e5ac6702c3061
SHA25682b15998fb343dfcecf9dbbdc6ebe09227e175102dff531476714a8d1811cf55
SHA51211036fc021515a4c3fc9e21864beb384e404f5778163bb8363e4c89f2596e4e0434beb57031f4c3c8d3394283dac2190ef53d5c51d6877900f2d3e9618679726