Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
0d3d022dc85ee0857f7d86653ee903fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d3d022dc85ee0857f7d86653ee903fe.exe
Resource
win10v2004-20231215-en
General
-
Target
0d3d022dc85ee0857f7d86653ee903fe.exe
-
Size
2.7MB
-
MD5
0d3d022dc85ee0857f7d86653ee903fe
-
SHA1
d4d1925962bffe38691cc5d0f502e146d52ea29a
-
SHA256
228c2c5ed04b6f7e386c10bb039d179c4c8314452b9db21507cb3bacbaa927cd
-
SHA512
abbe2edd86add626a22d367f0f8561ac20b0c0da7a74d6e4858b51996a6be8e9db8c07e222c245150f4f733cf75799d556d82f47a6bd635d703c9025b4aa200f
-
SSDEEP
49152:BZ74mej7s9QlRZPswbIEvSD7haUNs/NW5GsA1L5jl89ebA5rOYiZnh:BN4aKfE0IPhaUNs3XtpAebSivZnh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 752 0d3d022dc85ee0857f7d86653ee903fe.tmp -
Loads dropped DLL 2 IoCs
pid Process 752 0d3d022dc85ee0857f7d86653ee903fe.tmp 752 0d3d022dc85ee0857f7d86653ee903fe.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 752 0d3d022dc85ee0857f7d86653ee903fe.tmp 752 0d3d022dc85ee0857f7d86653ee903fe.tmp 752 0d3d022dc85ee0857f7d86653ee903fe.tmp 752 0d3d022dc85ee0857f7d86653ee903fe.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 784 wrote to memory of 752 784 0d3d022dc85ee0857f7d86653ee903fe.exe 30 PID 784 wrote to memory of 752 784 0d3d022dc85ee0857f7d86653ee903fe.exe 30 PID 784 wrote to memory of 752 784 0d3d022dc85ee0857f7d86653ee903fe.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d3d022dc85ee0857f7d86653ee903fe.exe"C:\Users\Admin\AppData\Local\Temp\0d3d022dc85ee0857f7d86653ee903fe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\is-50S0A.tmp\0d3d022dc85ee0857f7d86653ee903fe.tmp"C:\Users\Admin\AppData\Local\Temp\is-50S0A.tmp\0d3d022dc85ee0857f7d86653ee903fe.tmp" /SL5="$60066,2132727,70144,C:\Users\Admin\AppData\Local\Temp\0d3d022dc85ee0857f7d86653ee903fe.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD50c44a0990707ad48ae7fcb7aa8fbbb50
SHA16dffeb89ab2f0e2c9a90b070ba167d9a2832d1b2
SHA256442ca20e42772e3603732ce1802c225acfc6586a248d40f32dda16aada039a84
SHA512a5110c5661d7992f0166c0b064d7f3c0fc270f463efb850758a3951c1201d455475eb4f98f223aed3f99695f47a3adc602d50910718aa4e1e60686b7b7b29432
-
Filesize
255KB
MD5ae5265b8908eac3ce324863bbcfffc5d
SHA1988532af1711bdcaea2669005401c0b15a520d58
SHA256dcf5e83bcf0662a76d8c2920bbefef1aee5e0f6335e260aaf96936449ac5c2a9
SHA51289646ff96bdd32f94c81d1cd69892a0b88343db08dfd318e88cd83ce45b5e338921fbdd0d044937d720dbe0e0f6cac62bc006345a29ae3f3b60d05cdb5521f47
-
Filesize
183KB
MD5db25dfdd4c1f2b65c68a230881072695
SHA194cd6a3438041f0e61b0a1bea7b66461854efe69
SHA2561b66aaf1e7e3c493dd96af3b7442ea60072f6e93ba45281eacd31a14ca7e7e73
SHA512db69e4ab2218856e5184d9094e7e39705b83e3efdc15225067205c8faf6e5836145364f1d509192defa3b48864e72b9f8c0f2dc53a7adb2b86c655318b7afc2c
-
Filesize
134KB
MD55c75699502b7a639fdc24be6a76766d8
SHA1e0af30c6710d9a8778e95aae75d49ab9cdb14d27
SHA256b45e0d36976f0543f4d832f55d6c3cdf75762692645084cb30c1d85722171ba0
SHA512d91b54acfc830421b9e9f337f1fb4b14e8f6c6153292627dfb5980f4d0e7f2b6a9d0427a4fb8d0f0a08336ec942087d2e74dfc0a25a26bece48c083a131c1eae
-
Filesize
164B
MD5adc799ec79eeaef366ea4dddf099c3ae
SHA1556c915615a34a2499604b7b732ab304b20fdd4e
SHA2567e7f18c73560f9c020abe1ab1f22705083281e2ea16ab0030fc927901b5b5d1e
SHA51276962a17cc26d3f9886828be4e43373ac530165e1c627272ed7c0bc731133e97608e55d2e31f44592aad0d0974352155f41a0718aa0666ec128406b1050c1d6c