Analysis
-
max time kernel
146s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
FlashPlayerPro.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
FlashPlayerPro.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
FlashPlayerPro.exe
-
Size
3.3MB
-
MD5
60f33d0e2422ff45bf09e6ed4deaa6cb
-
SHA1
76452ee5c1ff2ea4840d37619623f4cf042bf1a0
-
SHA256
de834467c1fb72efd77570d49eb46d7d18d4bb0dbddee7896efb7e0e1d8a8fff
-
SHA512
475c6ceb6060203ae37e34d6f9ef192e8e171fa82d0adee82ff31b3be556019a9dff313f639eae1a47976d3965671e42ca7f72c6d55ca3ebef85d563d3ab6340
-
SSDEEP
49152:v2YI3deBKRwtUdAEf2BXHp+4lC5mtAwmXgkStxXsU/GejywnF1BBeLP5OrXw7Rkh:uzdeo+EfSZC51w2SOUyO1BBeLPn7R+2A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4352 FlashPlayerPro.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4352 1176 FlashPlayerPro.exe 89 PID 1176 wrote to memory of 4352 1176 FlashPlayerPro.exe 89 PID 1176 wrote to memory of 4352 1176 FlashPlayerPro.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\FlashPlayerPro.exe"C:\Users\Admin\AppData\Local\Temp\FlashPlayerPro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\is-U26BL.tmp\FlashPlayerPro.tmp"C:\Users\Admin\AppData\Local\Temp\is-U26BL.tmp\FlashPlayerPro.tmp" /SL5="$600EE,3202793,53248,C:\Users\Admin\AppData\Local\Temp\FlashPlayerPro.exe"2⤵
- Executes dropped EXE
PID:4352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
415KB
MD513bdc870cef104385a9af1beb892f339
SHA1d619c92e0ddca8dfc96c96152c5ba73faa75dc48
SHA256a0d15b730660aaa916403b22b7c3be2caa324365040adbd8c3c08daabc66faa1
SHA5122e3aeb5676c47825000f70503be23a9dd0a5e2a967365bab1604102168b25ff1ec191d0f6ddaf630c78e49ff302a4876ce9368cdf9e5f9a236d520063cad71ff
-
Filesize
669KB
MD552950ac9e2b481453082f096120e355a
SHA1159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA25625fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
SHA5125b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba