Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:01
Static task
static1
Behavioral task
behavioral1
Sample
TelSM320.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
TelSM320.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
TelSM320.exe
-
Size
4.8MB
-
MD5
b78e230345a0896e4fabca9e740b702f
-
SHA1
e64dc3a11e3b1abb5d247c646ac3a643fee57261
-
SHA256
944ff487f4ab8e3b3a0d9004c1b816ac1397783c75a5d82ba665467e4e930066
-
SHA512
51eb7fd8758873d4dfbfcad5ef7cf97495119d7df1b85f1c932cba8eeb62f9c8d38d92ea4cbbcbf4bed04df27ed81e1a367277d3f75dfc12b473eb7b168c9b87
-
SSDEEP
98304:3RcxdHsgoWFKYWVAF3vLewmTKKjVCiEREqvlyAchvzGstklI8LZ:asjSKO/LzmTKK13dRUmO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4404 TelSM320.tmp -
Loads dropped DLL 2 IoCs
pid Process 4404 TelSM320.tmp 4404 TelSM320.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1204 wrote to memory of 4404 1204 TelSM320.exe 20 PID 1204 wrote to memory of 4404 1204 TelSM320.exe 20 PID 1204 wrote to memory of 4404 1204 TelSM320.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\TelSM320.exe"C:\Users\Admin\AppData\Local\Temp\TelSM320.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\is-B3QGE.tmp\TelSM320.tmp"C:\Users\Admin\AppData\Local\Temp\is-B3QGE.tmp\TelSM320.tmp" /SL5="$F0044,4719096,52224,C:\Users\Admin\AppData\Local\Temp\TelSM320.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4404
-