Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 05:01
Static task
static1
Behavioral task
behavioral1
Sample
292dcb0f58d0a8f7e27b1d4a512eed31.exe
Resource
win7-20231215-en
General
-
Target
292dcb0f58d0a8f7e27b1d4a512eed31.exe
-
Size
876KB
-
MD5
292dcb0f58d0a8f7e27b1d4a512eed31
-
SHA1
41824ce65a0704711c2942b39bc63b8234b313b3
-
SHA256
12143c1b19e922ac899c9a9d92d179e8136169ede869947d5c24e253bfa20c70
-
SHA512
f0053e4b739bbade56515688fb1980e8e2157024762b7fa3914c49273515ab1a7fa4d0f24e179e3e70ed8cc213aa9d65a8fc4c7771f7a0e85dbc66084ba6530e
-
SSDEEP
24576:rSMLKmtvPyHu7CiNym4xy9pNg4W7HMNG3bOAHCzjqY:WiKmHyOlMfp7s+jY
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3040 292dcb0f58d0a8f7e27b1d4a512eed31.exe 3040 292dcb0f58d0a8f7e27b1d4a512eed31.exe 3040 292dcb0f58d0a8f7e27b1d4a512eed31.exe 3040 292dcb0f58d0a8f7e27b1d4a512eed31.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 292dcb0f58d0a8f7e27b1d4a512eed31.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2368 2288 292dcb0f58d0a8f7e27b1d4a512eed31.exe 28 PID 2288 wrote to memory of 2368 2288 292dcb0f58d0a8f7e27b1d4a512eed31.exe 28 PID 2288 wrote to memory of 2368 2288 292dcb0f58d0a8f7e27b1d4a512eed31.exe 28 PID 2288 wrote to memory of 2368 2288 292dcb0f58d0a8f7e27b1d4a512eed31.exe 28 PID 2288 wrote to memory of 2368 2288 292dcb0f58d0a8f7e27b1d4a512eed31.exe 28 PID 2288 wrote to memory of 2368 2288 292dcb0f58d0a8f7e27b1d4a512eed31.exe 28 PID 2288 wrote to memory of 2368 2288 292dcb0f58d0a8f7e27b1d4a512eed31.exe 28 PID 2368 wrote to memory of 3040 2368 292dcb0f58d0a8f7e27b1d4a512eed31.exe 29 PID 2368 wrote to memory of 3040 2368 292dcb0f58d0a8f7e27b1d4a512eed31.exe 29 PID 2368 wrote to memory of 3040 2368 292dcb0f58d0a8f7e27b1d4a512eed31.exe 29 PID 2368 wrote to memory of 3040 2368 292dcb0f58d0a8f7e27b1d4a512eed31.exe 29 PID 2368 wrote to memory of 3040 2368 292dcb0f58d0a8f7e27b1d4a512eed31.exe 29 PID 2368 wrote to memory of 3040 2368 292dcb0f58d0a8f7e27b1d4a512eed31.exe 29 PID 2368 wrote to memory of 3040 2368 292dcb0f58d0a8f7e27b1d4a512eed31.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\292dcb0f58d0a8f7e27b1d4a512eed31.exe"C:\Users\Admin\AppData\Local\Temp\292dcb0f58d0a8f7e27b1d4a512eed31.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\292dcb0f58d0a8f7e27b1d4a512eed31.exe"C:\Users\Admin\AppData\Local\Temp\292dcb0f58d0a8f7e27b1d4a512eed31.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\292dcb0f58d0a8f7e27b1d4a512eed31.exe"C:\Users\Admin\AppData\Local\Temp\292dcb0f58d0a8f7e27b1d4a512eed31.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5ab06dc7db8b0c0da10093c1b1fe916a2
SHA1afb69654d97594f2a857e7df672a9555de2f4158
SHA25639def7aa5a4f02e35766aaa16c4a6aa0d4b3568996ad80331a8050b9053d54f0
SHA512999c0632ddca5a5d32781d653486f16ea767ba663c76e437d25cbbe4a999a4e381bcc546d7b860b54a3ca8474a3503688bb2230b2b100bc9223a2800281b1f96
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD59c65cbc2000a563b8ac850ba9ddca431
SHA1a0ac81f729fe52a3070270224c06d3135c611499
SHA256f2eafbd274f8cedafd523041009aab070f06064936bc70a269efe39e86900333
SHA512db4da1c070cc01b21e05aba21ab2c8e7807bdc443be16118b6636f8a3b1532efdae8f1f8bf51869ed241104f47c879b04667d2c63fcdfb39b0f5e48056e00373