Analysis
-
max time kernel
118s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:11
Static task
static1
Behavioral task
behavioral1
Sample
279e72c35e1da22a3b54952ae27be05c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
279e72c35e1da22a3b54952ae27be05c.exe
Resource
win10v2004-20231215-en
General
-
Target
279e72c35e1da22a3b54952ae27be05c.exe
-
Size
58KB
-
MD5
279e72c35e1da22a3b54952ae27be05c
-
SHA1
7d3c6e35b746045adde0ad6988a2b065aad270d2
-
SHA256
5cf56064038420405669c558cf894908422f66db2214db055cb49fecc5618b81
-
SHA512
7e18bd1eb6d72009b95a6f50a310b2f998b4272feed0197387056aff2d2640f4e43fd72351173f5c30d403535c5919bfe235d066a60e3b9f5a76dc28ba861d72
-
SSDEEP
1536:TFzC7r8NjnQXCMtjWcEMgS+nwEHW90Jz1qJSj3GgR15:hC7r8NjQLh+wEHJJzon67
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2548 wls3.exe -
Loads dropped DLL 1 IoCs
pid Process 2548 wls3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\wls3 = "C:\\Windows\\wls3.exe" wls3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wls3.exe 279e72c35e1da22a3b54952ae27be05c.exe File opened for modification C:\Windows\wls3.exe 279e72c35e1da22a3b54952ae27be05c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2808 279e72c35e1da22a3b54952ae27be05c.exe 2548 wls3.exe 2548 wls3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 wls3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2548 2808 279e72c35e1da22a3b54952ae27be05c.exe 29 PID 2808 wrote to memory of 2548 2808 279e72c35e1da22a3b54952ae27be05c.exe 29 PID 2808 wrote to memory of 2548 2808 279e72c35e1da22a3b54952ae27be05c.exe 29 PID 2808 wrote to memory of 2548 2808 279e72c35e1da22a3b54952ae27be05c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\279e72c35e1da22a3b54952ae27be05c.exe"C:\Users\Admin\AppData\Local\Temp\279e72c35e1da22a3b54952ae27be05c.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\wls3.exeC:\Windows\wls3.exe /af8@C:\Users\Admin\AppData\Local\Temp\279e72c35e1da22a3b54952ae27be05c.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5279e72c35e1da22a3b54952ae27be05c
SHA17d3c6e35b746045adde0ad6988a2b065aad270d2
SHA2565cf56064038420405669c558cf894908422f66db2214db055cb49fecc5618b81
SHA5127e18bd1eb6d72009b95a6f50a310b2f998b4272feed0197387056aff2d2640f4e43fd72351173f5c30d403535c5919bfe235d066a60e3b9f5a76dc28ba861d72
-
Filesize
44KB
MD552297af1699b40f28c33eea774693049
SHA135317308fa5d145e960e087e30fc5831e52b1302
SHA25648166431a598d749a46ee4339f5163709f0867f5084c6d7d8b027086d0065763
SHA5124e52b3fb6fd7712f9ca927de71fd540828b6d7550c78553e1fea715256164bc5ef9c5e74c3b930d5f9fbf6fe1a11736ef66af60827e1c67283749ec64453a3c9