Analysis
-
max time kernel
28s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
1cea24d80129f6ae6e00cead0741f93d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1cea24d80129f6ae6e00cead0741f93d.exe
Resource
win10v2004-20231215-en
General
-
Target
1cea24d80129f6ae6e00cead0741f93d.exe
-
Size
440KB
-
MD5
1cea24d80129f6ae6e00cead0741f93d
-
SHA1
c2bed1de0699d8f1d23d2513f9c06d0aeb5e2474
-
SHA256
d3aaf87cb5536dd1d46de93e08e72cd9db69f7d4848bdd9a4d113d79ca6e8870
-
SHA512
4524da158fadfc79acba682b13fef33d49c2cadce26ba84a7b73a603d064283547a5c7ea132054d611bd322c7ec137dfe1809000ec75ffea38aa3c1feaf1851e
-
SSDEEP
6144:5lbzcYnRNkVsuaRaU6mHGO4rBfL1RCaSC0eZylPwhMX8BOd41NX/+uJ82wl9J+F5:n0aRz6mHGV1R3/ZyWuzdGl/tJkJ+zPr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2700 c308.exe -
Loads dropped DLL 2 IoCs
pid Process 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\c308.exe 1cea24d80129f6ae6e00cead0741f93d.exe File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX 1cea24d80129f6ae6e00cead0741f93d.exe File opened for modification C:\Windows\SysWOW64\MSINET.OCX 1cea24d80129f6ae6e00cead0741f93d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe 1232 1cea24d80129f6ae6e00cead0741f93d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1232 1cea24d80129f6ae6e00cead0741f93d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2700 1232 1cea24d80129f6ae6e00cead0741f93d.exe 28 PID 1232 wrote to memory of 2700 1232 1cea24d80129f6ae6e00cead0741f93d.exe 28 PID 1232 wrote to memory of 2700 1232 1cea24d80129f6ae6e00cead0741f93d.exe 28 PID 1232 wrote to memory of 2700 1232 1cea24d80129f6ae6e00cead0741f93d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cea24d80129f6ae6e00cead0741f93d.exe"C:\Users\Admin\AppData\Local\Temp\1cea24d80129f6ae6e00cead0741f93d.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\c308.exeC:\Windows\system32\c308.exe2⤵
- Executes dropped EXE
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD56a7ae7e491182a4190209a1c07e3dfd2
SHA1ba0269a7bd9094d1cd84b857c295b4630f68335d
SHA256fa8b650cac98bc85962a38052c94a12c35321950362cedd37ecb8227096176b1
SHA51269cb932fde686c17770d2d62e65c0d39963b92d58aa81a5226be97fca0d8c6c6d9fef848362fac8df412632a6b0bdb8b4b92ef6f4a98b705082ef03eb16bd255