Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
20e276c092e8989e3f31883a5a6c3c92.exe
Resource
win7-20231215-en
General
-
Target
20e276c092e8989e3f31883a5a6c3c92.exe
-
Size
877KB
-
MD5
20e276c092e8989e3f31883a5a6c3c92
-
SHA1
c4ebca5d89f60d90d3f2d9ba03ef54ee3fa6d904
-
SHA256
05b3e96f5438fbdaf3e33ec5e75992b7390295c82d3030e93376e21a6af831a1
-
SHA512
74377facaf4b3c61fc82ef0fd006a24ef1e414c5417c3647bf0bcf4466f6e47d3daf2aa4d9bfe1d6570c9c6ea3c15268bef5c0b31fd4fc863d9b3c3015351d9f
-
SSDEEP
24576:1CMLKmtvPyHu7iqNd2rmy9pNg4W7HMLG3bOAHCJI:AiKmHyOfUrYp7s8D
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 3364 20e276c092e8989e3f31883a5a6c3c92.exe 3364 20e276c092e8989e3f31883a5a6c3c92.exe 3364 20e276c092e8989e3f31883a5a6c3c92.exe 3364 20e276c092e8989e3f31883a5a6c3c92.exe 3364 20e276c092e8989e3f31883a5a6c3c92.exe 3364 20e276c092e8989e3f31883a5a6c3c92.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 20e276c092e8989e3f31883a5a6c3c92.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1912 wrote to memory of 3092 1912 20e276c092e8989e3f31883a5a6c3c92.exe 89 PID 1912 wrote to memory of 3092 1912 20e276c092e8989e3f31883a5a6c3c92.exe 89 PID 1912 wrote to memory of 3092 1912 20e276c092e8989e3f31883a5a6c3c92.exe 89 PID 3092 wrote to memory of 3364 3092 20e276c092e8989e3f31883a5a6c3c92.exe 90 PID 3092 wrote to memory of 3364 3092 20e276c092e8989e3f31883a5a6c3c92.exe 90 PID 3092 wrote to memory of 3364 3092 20e276c092e8989e3f31883a5a6c3c92.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\20e276c092e8989e3f31883a5a6c3c92.exe"C:\Users\Admin\AppData\Local\Temp\20e276c092e8989e3f31883a5a6c3c92.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\20e276c092e8989e3f31883a5a6c3c92.exe"C:\Users\Admin\AppData\Local\Temp\20e276c092e8989e3f31883a5a6c3c92.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\20e276c092e8989e3f31883a5a6c3c92.exe"C:\Users\Admin\AppData\Local\Temp\20e276c092e8989e3f31883a5a6c3c92.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5c41cfcef3e866372a37d34ef8483c0f9
SHA17ba6edd190e0ee5f9ede3adc0698386d14975622
SHA25647def8ff1f6b2a4cb249a0e79144445f627cfcb6516bdbd7b64335efb856b0f9
SHA512dd1829021c0afcf914effa77a3d7210736d9db12cfb7ae639c675566f4fbca57dedda2b7789bc9cb77b97960f5531b1f432df9dde8053924344bdc1805ee8ab5
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5ac7bc4b973cc32527e8500b8e925f88b
SHA1c3fba0600b705a6fb6e83ddcb75c64d0009d2e41
SHA256486c267edff7061fac7959c1e42a623e185288401648d85e730b95c10dec2a4d
SHA5126140a614f845c3f03a26a737e7d077e4ed480a56b0a447c9e672c0d41ffca0b7b9bbc51e57d1809fc686aedba694f299c97da881cbc1a71d8da3e46efa2d6636