Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b109f79825948a8db84e420f6ee05d6.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b109f79825948a8db84e420f6ee05d6.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0b109f79825948a8db84e420f6ee05d6.exe
-
Size
938KB
-
MD5
0b109f79825948a8db84e420f6ee05d6
-
SHA1
ceb3d1ce4626cf49b71028f321ad8c2aa98d9650
-
SHA256
e87211d098d42b83b2888353034ffda4d9fcd817dcc401aeca2e733fec2ad671
-
SHA512
1bfdaf6e3bc4748be9494fe5ffeb38d93f482f9602d04ed9ee30d07488a066b7e5c103a37e7c9c287e1a657b6f6d8925549f02666619d0b8dba790ea6adfb459
-
SSDEEP
24576:OpSS+iYBuAYarjPqRnFSuJKj7zbSHw/cDKgM3T+Bzty:OpSS+buAYGjPqRnFJubSHw/eKgST+BzY
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 INS4E10.tmp -
Loads dropped DLL 2 IoCs
pid Process 2584 INS4E10.tmp 2584 INS4E10.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2584 2384 0b109f79825948a8db84e420f6ee05d6.exe 18 PID 2384 wrote to memory of 2584 2384 0b109f79825948a8db84e420f6ee05d6.exe 18 PID 2384 wrote to memory of 2584 2384 0b109f79825948a8db84e420f6ee05d6.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b109f79825948a8db84e420f6ee05d6.exe"C:\Users\Admin\AppData\Local\Temp\0b109f79825948a8db84e420f6ee05d6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\INS4E10.tmpC:\Users\Admin\AppData\Local\Temp\INS4E10.tmp /SL3 $11006E C:\Users\Admin\AppData\Local\Temp\0b109f79825948a8db84e420f6ee05d6.exe 883717 887710 655362⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2584
-