Analysis
-
max time kernel
13s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 02:07
Static task
static1
Behavioral task
behavioral1
Sample
0b1bab6efd84cc3291d99fa199462b2b.exe
Resource
win7-20231215-en
General
-
Target
0b1bab6efd84cc3291d99fa199462b2b.exe
-
Size
876KB
-
MD5
0b1bab6efd84cc3291d99fa199462b2b
-
SHA1
84536f2d2547107c69402d69eac4954ee2cb5552
-
SHA256
23a3016434f96377c4805910d3ae561bde21263f52b8a0f40ede7173e14b9992
-
SHA512
61507b2036d5ecf7fa41fa6a5158896689e53aea712f39dc045affea8093e325b0b092e5ab37af15b55e72742b214a5bcfbd30c2f01cccad502f41088ef01d84
-
SSDEEP
24576:eOMLKmtvPyHu7DyiOy9pNg4W7HMAG3bOAHCS8zf:HiKmHyOn6p7sPC
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2544 0b1bab6efd84cc3291d99fa199462b2b.exe 2544 0b1bab6efd84cc3291d99fa199462b2b.exe 2544 0b1bab6efd84cc3291d99fa199462b2b.exe 2544 0b1bab6efd84cc3291d99fa199462b2b.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0b1bab6efd84cc3291d99fa199462b2b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2044 1740 0b1bab6efd84cc3291d99fa199462b2b.exe 28 PID 1740 wrote to memory of 2044 1740 0b1bab6efd84cc3291d99fa199462b2b.exe 28 PID 1740 wrote to memory of 2044 1740 0b1bab6efd84cc3291d99fa199462b2b.exe 28 PID 1740 wrote to memory of 2044 1740 0b1bab6efd84cc3291d99fa199462b2b.exe 28 PID 1740 wrote to memory of 2044 1740 0b1bab6efd84cc3291d99fa199462b2b.exe 28 PID 1740 wrote to memory of 2044 1740 0b1bab6efd84cc3291d99fa199462b2b.exe 28 PID 1740 wrote to memory of 2044 1740 0b1bab6efd84cc3291d99fa199462b2b.exe 28 PID 2044 wrote to memory of 2544 2044 0b1bab6efd84cc3291d99fa199462b2b.exe 27 PID 2044 wrote to memory of 2544 2044 0b1bab6efd84cc3291d99fa199462b2b.exe 27 PID 2044 wrote to memory of 2544 2044 0b1bab6efd84cc3291d99fa199462b2b.exe 27 PID 2044 wrote to memory of 2544 2044 0b1bab6efd84cc3291d99fa199462b2b.exe 27 PID 2044 wrote to memory of 2544 2044 0b1bab6efd84cc3291d99fa199462b2b.exe 27 PID 2044 wrote to memory of 2544 2044 0b1bab6efd84cc3291d99fa199462b2b.exe 27 PID 2044 wrote to memory of 2544 2044 0b1bab6efd84cc3291d99fa199462b2b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"C:\Users\Admin\AppData\Local\Temp\0b1bab6efd84cc3291d99fa199462b2b.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5c6ebad4112d5c06893e9d4bb6d78c8f8
SHA155c9aad03472b2c5e90a2dd409a424b971b30e6f
SHA256c8f2cc3598bc74bcd47cf362f4e5a8e4798544ba2d79191f10853e529837d9a7
SHA512664ebf7105a968263225b59d87533e8cd83172a6759385e2a1be9bf992047b20207b208c77c1f1432e8f897442f8a3a848f515476ed00ef083a4435e16db65de
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5747b72f8457485e0a3983cb846bc3931
SHA156fc39f830af52fefb70530f1a8ea1f590651143
SHA2566f91fc12561ce1e2f213ca430a272255983984c04e93ba78b2bb634288a6bea5
SHA512c114e6bf6a37b7f0b8d93f28fb40958febe141fb20a098deb4ca9a91b2a3ed6a592cfe10330b0571c6d925beb8f34da80dda7297b3e960d34df16546d6408503