Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:52
Static task
static1
Behavioral task
behavioral1
Sample
1675e3019087826c1ae5dfb2792fe4d4.exe
Resource
win7-20231129-en
General
-
Target
1675e3019087826c1ae5dfb2792fe4d4.exe
-
Size
876KB
-
MD5
1675e3019087826c1ae5dfb2792fe4d4
-
SHA1
7b1371b6ce33ecbdd17be93f78f2f79957e65c13
-
SHA256
3d804529e96ce0f02bd6836edb6e2e369cf489780f919474a3738b5356a36033
-
SHA512
86ac712e8f255010156efaf2c8ac74296370e20023df11db66f8f78a3acc8cc7aa3f8ff7d52ba5a83528e64410768126f67c3d79be6b6ac452fffcbda8d0acb2
-
SSDEEP
24576:ICMLKmtvPyHu7iqNd2rmy9pNg4W7HMLG3bOAHCJJkr:tiKmHyOfUrYp7s8Lr
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2552 1675e3019087826c1ae5dfb2792fe4d4.exe 2552 1675e3019087826c1ae5dfb2792fe4d4.exe 2552 1675e3019087826c1ae5dfb2792fe4d4.exe 2552 1675e3019087826c1ae5dfb2792fe4d4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1675e3019087826c1ae5dfb2792fe4d4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2912 2968 1675e3019087826c1ae5dfb2792fe4d4.exe 15 PID 2968 wrote to memory of 2912 2968 1675e3019087826c1ae5dfb2792fe4d4.exe 15 PID 2968 wrote to memory of 2912 2968 1675e3019087826c1ae5dfb2792fe4d4.exe 15 PID 2968 wrote to memory of 2912 2968 1675e3019087826c1ae5dfb2792fe4d4.exe 15 PID 2968 wrote to memory of 2912 2968 1675e3019087826c1ae5dfb2792fe4d4.exe 15 PID 2968 wrote to memory of 2912 2968 1675e3019087826c1ae5dfb2792fe4d4.exe 15 PID 2968 wrote to memory of 2912 2968 1675e3019087826c1ae5dfb2792fe4d4.exe 15 PID 2912 wrote to memory of 2552 2912 1675e3019087826c1ae5dfb2792fe4d4.exe 14 PID 2912 wrote to memory of 2552 2912 1675e3019087826c1ae5dfb2792fe4d4.exe 14 PID 2912 wrote to memory of 2552 2912 1675e3019087826c1ae5dfb2792fe4d4.exe 14 PID 2912 wrote to memory of 2552 2912 1675e3019087826c1ae5dfb2792fe4d4.exe 14 PID 2912 wrote to memory of 2552 2912 1675e3019087826c1ae5dfb2792fe4d4.exe 14 PID 2912 wrote to memory of 2552 2912 1675e3019087826c1ae5dfb2792fe4d4.exe 14 PID 2912 wrote to memory of 2552 2912 1675e3019087826c1ae5dfb2792fe4d4.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2552
-
C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2912
-
C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"C:\Users\Admin\AppData\Local\Temp\1675e3019087826c1ae5dfb2792fe4d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5c41cfcef3e866372a37d34ef8483c0f9
SHA17ba6edd190e0ee5f9ede3adc0698386d14975622
SHA25647def8ff1f6b2a4cb249a0e79144445f627cfcb6516bdbd7b64335efb856b0f9
SHA512dd1829021c0afcf914effa77a3d7210736d9db12cfb7ae639c675566f4fbca57dedda2b7789bc9cb77b97960f5531b1f432df9dde8053924344bdc1805ee8ab5
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
92KB
MD57f949bcf9f0a698818748699306e8179
SHA19ce189fb467c95786267ceb69c915177055df80d
SHA256d20fe4bb9fbddd3405b09f52df2aeea83c903b6fe79ecebbbbe4b333a3fabfe0
SHA5120e3d497fa36d7093885f431b865d6b00a13c5ab510679227672717b9a25d5ad345d36ce1a8c4d7836927cef2692c3271765525685bab45decce271c26e2076d4