Analysis
-
max time kernel
1s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:26
Static task
static1
Behavioral task
behavioral1
Sample
21a9a48607013f66a812fd59c31c7afe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21a9a48607013f66a812fd59c31c7afe.exe
Resource
win10v2004-20231222-en
General
-
Target
21a9a48607013f66a812fd59c31c7afe.exe
-
Size
655KB
-
MD5
21a9a48607013f66a812fd59c31c7afe
-
SHA1
29ad2ac088ab0abea1fe4a96f069f7c73fe3d472
-
SHA256
211a7146bb1be7a59528ac7b9cc62e860d9be8536fe3f9931825899c5eff3666
-
SHA512
f0ffa48d79f9300abc73343fdda39e224f4ea3349ee780dd22d7ab4b58ccfedf206f210bcd0f16a66ea0e0df2d350ac4ed6bf3830875c000939a54d53b137495
-
SSDEEP
12288:04BS2ly9NKPRdegPsgQr/745jezvROTVo80d1WU1ntTxJ10gJ1TvzM:0hhKeiHQr/s1uRCBQWMxDpM
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
pid Process 2740 21a9a48607013f66a812fd59c31c7afe.exe 3500 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe 3004 21a9a48607013f66a812fd59c31c7afe.exe -
resource yara_rule behavioral2/memory/3004-212-0x0000000003310000-0x000000000331C000-memory.dmp upx behavioral2/memory/3004-420-0x0000000003310000-0x000000000331C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2740 wrote to memory of 3500 2740 21a9a48607013f66a812fd59c31c7afe.exe 19 PID 2740 wrote to memory of 3500 2740 21a9a48607013f66a812fd59c31c7afe.exe 19 PID 2740 wrote to memory of 3500 2740 21a9a48607013f66a812fd59c31c7afe.exe 19 PID 3500 wrote to memory of 3004 3500 21a9a48607013f66a812fd59c31c7afe.exe 20 PID 3500 wrote to memory of 3004 3500 21a9a48607013f66a812fd59c31c7afe.exe 20 PID 3500 wrote to memory of 3004 3500 21a9a48607013f66a812fd59c31c7afe.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\21a9a48607013f66a812fd59c31c7afe.exe"C:\Users\Admin\AppData\Local\Temp\21a9a48607013f66a812fd59c31c7afe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\21a9a48607013f66a812fd59c31c7afe.exe"C:\Users\Admin\AppData\Local\Temp\21a9a48607013f66a812fd59c31c7afe.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\21a9a48607013f66a812fd59c31c7afe.exe"C:\Users\Admin\AppData\Local\Temp\21a9a48607013f66a812fd59c31c7afe.exe"3⤵
- Loads dropped DLL
PID:3004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD54e08fe995ab74ba4d145ddb77ea095fc
SHA1e4bb337e40069c097e7abd566b7427b11fb124ee
SHA256ace3c561f186dfbb5c992f85ea2ab4d3061894509af6960e9d819152afa46b17
SHA512b056fbe0e79d90f8ce0908eb2b75f589e4415ed462868aaff6032f12dde394058cd221d317b92fc4809aa27d6cf2e801c4215db3cab1267ebd9dbc9af7b7041f
-
Filesize
80KB
MD54bf7db111acfa7c28ad36606107b3322
SHA16f20b9f6663ce0c309a2ce60e718d64ffb6c75b3
SHA256bfe8445c38ee71240e856f85d79e94123d7179bf43688de0e2a14e32e6ef21b0
SHA5120a5e66a65b80e15d8198f2934c58227ae17680f0fbea9865b2f44af82a29c53d4f95cf9616b4dfd75202420eb73b7d962cf2c84fdad6ce26afe1eb4bb978d0b6
-
Filesize
25KB
MD50f26c6d34d3841e93145dd00d0175651
SHA157b068569d0eb2336503beed87589629ab2a6f1f
SHA2560cc5dc45b6a04ec236f4ecf0eeee212096b1561179d71c49dd5fc82aba706741
SHA51272785e520d78a4ebd8779e5497806406c1b91b9c05ed82a392a6af689781e26c77f0032c66540b80e2e7e457128df2afd0647b0dbc970a11d0cd4ee3930d47a5
-
Filesize
11KB
MD57292b642bd958aeb7fd7cfd19e45b068
SHA119a800620d041634abae5b5d096cb0e87ce4c188
SHA25690f1bb98e034fcf7bfddb8cb0a85b27a9c9ddb01b926b4e139e1e8fc53d41d09
SHA512bd758e0833454e0aa2af976ac94fde17c5401102c5991887cefbe8e337974381584c73e2d1e50e49263c55c3788e24dc7f8bd0b9d2a76a6cbe38e48dd9d6c44a
-
Filesize
10KB
MD57e3c808299aa2c405dffa864471ddb7f
SHA1b5de7804dd35ed7afd0c3b59d866f1a0749495e0
SHA25691c47a9a54a3a8c359e89a8b4e133e6b7296586748ed3e8f4fe566abd6c81ddd
SHA512599f61d5270227a68e5c4b8db41b5aa7bc17a4bbe91dd7336b410516fa6107f4f5bf0bbb3f6cc4b2e15b16bf9495fdc70832bab6262046cb136ad18f0c9b3738
-
Filesize
98KB
MD5a1630e6d6757d2ea1685de0740aa51df
SHA17d5fae68c0cad3d519e9b5578b065a7a7b547123
SHA256c9e8458c8e89d37f453bb412fa21095d7f5e2465b965c7fe11a71f3c08374cbf
SHA5127a4d2f638605dab97fcf1fe0218c14e7eadfc20e222014729d840d9141c3b5d105a53d045bc98adafc9baeccd9c5c73dd4324a4b861658021f645e60418d6537
-
Filesize
85KB
MD55822823b571fec9f08842e53b26a5c19
SHA101ae238f4753bbc5bbfb15c38913e4a095681bcd
SHA2564baabbf94e0eb61a2fe5ca6e08aa1dc75059a3df211ff0c5523d7a589df59aa6
SHA5129668b270115e378076b837971af31cfe3ac56cd1589d11dcab6521d586ddf2d3d5954c287a8c6aca92b459549f81e224375923b87e937370cf233b1cf11ea38a