Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 12:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
369db89ccfc696f1995adf2c16072f11.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
369db89ccfc696f1995adf2c16072f11.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
369db89ccfc696f1995adf2c16072f11.exe
-
Size
410KB
-
MD5
369db89ccfc696f1995adf2c16072f11
-
SHA1
c3f057aa7daead4c385d5cf13a96810450afeb28
-
SHA256
3648ae6564f558e54ecb67f35aec27b5b7421495e5ec772d3335dd6975320e65
-
SHA512
8bec0418aea946c0465c1642c01c4d9d1c5319b4c4d0be2a2527efbb8b5a42a91d451dca5cf5f72822a22c0809c17f3430acdf7b7c7da26117246aee52f53033
-
SSDEEP
12288:CxIK9V14ImyHYud8FWik82S2BUL5EB0EK:CJEyYud+Wik82S2BUL5E0EK
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3764 wtslsl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\wtslsl.exe" wtslsl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 3764 1648 369db89ccfc696f1995adf2c16072f11.exe 93 PID 1648 wrote to memory of 3764 1648 369db89ccfc696f1995adf2c16072f11.exe 93 PID 1648 wrote to memory of 3764 1648 369db89ccfc696f1995adf2c16072f11.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\369db89ccfc696f1995adf2c16072f11.exe"C:\Users\Admin\AppData\Local\Temp\369db89ccfc696f1995adf2c16072f11.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\ProgramData\wtslsl.exe"C:\ProgramData\wtslsl.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3764
-