Analysis
-
max time kernel
0s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2a191009fb7b2665ee2f1f78a6f38211.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a191009fb7b2665ee2f1f78a6f38211.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
2a191009fb7b2665ee2f1f78a6f38211.exe
-
Size
2.5MB
-
MD5
2a191009fb7b2665ee2f1f78a6f38211
-
SHA1
a15fd55d33a4484cde777089a50dd6a73938c540
-
SHA256
f91f8abfb1586925a6096ffd1a862550211a55d286cd0394d4ab984a529e4c58
-
SHA512
15daf728e0dcc43b24ed35de35c2d5682df7b1664c48a7a8f41ff6aba4d7f60608123477a0a7daef702dc1ded937066c93c3c8e4f6e25d54c98fd90d54a6285f
-
SSDEEP
49152:oky796EvMtTx435MtV+Oj29Ls3t/cwCxHHlc2KP1z8o/MO2Uqed3yBI1rp:o7AEvgVOy29Ls3JslVYzjMO26ie
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3092 2a191009fb7b2665ee2f1f78a6f38211.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4512 wrote to memory of 3092 4512 2a191009fb7b2665ee2f1f78a6f38211.exe 20 PID 4512 wrote to memory of 3092 4512 2a191009fb7b2665ee2f1f78a6f38211.exe 20 PID 4512 wrote to memory of 3092 4512 2a191009fb7b2665ee2f1f78a6f38211.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a191009fb7b2665ee2f1f78a6f38211.exe"C:\Users\Admin\AppData\Local\Temp\2a191009fb7b2665ee2f1f78a6f38211.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\is-SQTHN.tmp\2a191009fb7b2665ee2f1f78a6f38211.tmp"C:\Users\Admin\AppData\Local\Temp\is-SQTHN.tmp\2a191009fb7b2665ee2f1f78a6f38211.tmp" /SL5="$401C6,2280122,153088,C:\Users\Admin\AppData\Local\Temp\2a191009fb7b2665ee2f1f78a6f38211.exe"2⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\is-ERL22.tmp\WMF.exe"C:\Users\Admin\AppData\Local\Temp\is-ERL22.tmp\WMF.exe" /aid=0 /sub=0 /sid=42 /name="4.rar" /fid= /stats=cS71pQPkuOys9C/drFU6n3IGsFZjWHRvzkHz3c2b3dwwR8mVZjZgLS2XN8hbXBHVQJx8wSdATUdUxi47zhaKew== /param=03⤵PID:4664
-
-