Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
0a89a489eb6e57ffff782112b7711fff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a89a489eb6e57ffff782112b7711fff.exe
Resource
win10v2004-20231215-en
General
-
Target
0a89a489eb6e57ffff782112b7711fff.exe
-
Size
1011KB
-
MD5
0a89a489eb6e57ffff782112b7711fff
-
SHA1
9e1bb97813b7fe52a02af292d4d6eca0bff765e0
-
SHA256
e0eacb8eae139ddfe9b5fc833902e8ed96cf95056dd7629304cd20700394394d
-
SHA512
1ab766b127bf7c3fa7ee8b505f8fca13dfbe3133615a914eae55453ab2c625db90862ac7020863ec321c83afb91ede00ef8b2c98129f0b19a93407ee0b380bd8
-
SSDEEP
24576:ZjysE/q1crLa6hoNXLunkJ8oYsQ2BeBADuKsuX:MecrLa6dkeExTv3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2860 0a89a489eb6e57ffff782112b7711fff.exe -
Loads dropped DLL 4 IoCs
pid Process 1988 0a89a489eb6e57ffff782112b7711fff.exe 2860 0a89a489eb6e57ffff782112b7711fff.exe 2860 0a89a489eb6e57ffff782112b7711fff.exe 2860 0a89a489eb6e57ffff782112b7711fff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2860 1988 0a89a489eb6e57ffff782112b7711fff.exe 28 PID 1988 wrote to memory of 2860 1988 0a89a489eb6e57ffff782112b7711fff.exe 28 PID 1988 wrote to memory of 2860 1988 0a89a489eb6e57ffff782112b7711fff.exe 28 PID 1988 wrote to memory of 2860 1988 0a89a489eb6e57ffff782112b7711fff.exe 28 PID 1988 wrote to memory of 2860 1988 0a89a489eb6e57ffff782112b7711fff.exe 28 PID 1988 wrote to memory of 2860 1988 0a89a489eb6e57ffff782112b7711fff.exe 28 PID 1988 wrote to memory of 2860 1988 0a89a489eb6e57ffff782112b7711fff.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a89a489eb6e57ffff782112b7711fff.exe"C:\Users\Admin\AppData\Local\Temp\0a89a489eb6e57ffff782112b7711fff.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\ijtmp_A22B83D8-507A-4CF0-86C7-5A10B98E38A0\0a89a489eb6e57ffff782112b7711fff.exeC:\Users\Admin\AppData\Local\Temp\ijtmp_A22B83D8-507A-4CF0-86C7-5A10B98E38A0\0a89a489eb6e57ffff782112b7711fff.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ijtmp_A22B83D8-507A-4CF0-86C7-5A10B98E38A0\0a89a489eb6e57ffff782112b7711fff.exe
Filesize704KB
MD552e37889a74503147fac8e8ffd708513
SHA1dd43dfbd9a78bbddd1921c0d80934eed33b2fcf0
SHA2563bc0da61196bfe01402b987f01f63fd53730f638e5bf47cf1f5fe68487dcb308
SHA512989a529dbc4fd22760200fd1dcbd55582adf9d44f36082914f8aa1a6e83a2050740b7cd9ccd71234cc34f7ca389aca4f8086c10d10a1c3f02618b195e2292e31
-
\Users\Admin\AppData\Local\Temp\ijtmp_A22B83D8-507A-4CF0-86C7-5A10B98E38A0\0a89a489eb6e57ffff782112b7711fff.exe
Filesize896KB
MD58dcdd60b47a7bd0a0fc582cbfb2fef20
SHA1379d4ce8037435b3b121afd0fa4dc6cf2ea108e6
SHA2560e68aad367c10c42df4dffc0fc0458835f7a58b5648384cb7b47177d48c2e014
SHA512e11c30518ae5d941372899589b2754dc5e88bc8c36223eb8a688e290fe95e4866a2beb8ce4a550f3a3155add1244779df3032f986ec890fc812ddab0755d069c
-
\Users\Admin\AppData\Local\Temp\ijtmp_A22B83D8-507A-4CF0-86C7-5A10B98E38A0\0a89a489eb6e57ffff782112b7711fff.exe
Filesize768KB
MD59e3fc10192dda3a1f36e258ab567b556
SHA18ba9ca70c3acc07c7f04c922dc0e24d6603e3c2b
SHA25614848d2a64b68158aa83bd1094acbc485050a7a068175a3d6c06057692ad3a35
SHA512fe4a0741dc93dd507234bc379534bf12eba8a2131363afba15434e4aec9c6e9164b5548cd408c9d0a6cc8549d50f501659992f610a531e52fcfdd51cf539132b
-
\Users\Admin\AppData\Local\Temp\ijtmp_A22B83D8-507A-4CF0-86C7-5A10B98E38A0\0a89a489eb6e57ffff782112b7711fff.exe
Filesize640KB
MD5ecf8d2a974ae18fdce081ab180cb39ff
SHA19aedb10d5139648e16c0a21a2e4e632f5fb90068
SHA256754e533c9aab943b6507a0c33a51d3d1e77db0c003bd09e35eefb2a66c88bc24
SHA512c6e7efd4b2a01a528343f5352d6a2e5f4aa730bf21909eaa6bbaff5b3db2fd545b84e848af293302c8dd70c42afd488f8d45fe27c9644c5ef4ca706460a179f5
-
\Users\Admin\AppData\Local\Temp\ijtmp_A22B83D8-507A-4CF0-86C7-5A10B98E38A0\0a89a489eb6e57ffff782112b7711fff.exe
Filesize1011KB
MD50a89a489eb6e57ffff782112b7711fff
SHA19e1bb97813b7fe52a02af292d4d6eca0bff765e0
SHA256e0eacb8eae139ddfe9b5fc833902e8ed96cf95056dd7629304cd20700394394d
SHA5121ab766b127bf7c3fa7ee8b505f8fca13dfbe3133615a914eae55453ab2c625db90862ac7020863ec321c83afb91ede00ef8b2c98129f0b19a93407ee0b380bd8