Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:46
Static task
static1
Behavioral task
behavioral1
Sample
38918f603b2e2bb4c09e69bc5f98cb71.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
38918f603b2e2bb4c09e69bc5f98cb71.exe
Resource
win10v2004-20231215-en
General
-
Target
38918f603b2e2bb4c09e69bc5f98cb71.exe
-
Size
109KB
-
MD5
38918f603b2e2bb4c09e69bc5f98cb71
-
SHA1
3d86e656d996a13921e79996dc6bd9e8c31ba93b
-
SHA256
8b143062ebc9e1dfbbdfd1a7a24eb88c2637294e15aa26d9c65b23e95f257eeb
-
SHA512
a326a0fe964cec626341aac47221036abc04a1c999d1a7f4e5634daacec0c67976f2397e051ec34beb7d4fac16ba1cb765d6cb701ed512bc7d67a7d91919a833
-
SSDEEP
3072:b+CLQALA6QggKEtEDxrg6hetSd397s60IVW:Kq1LA6SrIrg6Ao39/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2096 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe 2096 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gciaui = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\gciaui.dll\",LoadMeshFromXInMemory" 38918f603b2e2bb4c09e69bc5f98cb71.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 880 38918f603b2e2bb4c09e69bc5f98cb71.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 880 wrote to memory of 2096 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 28 PID 880 wrote to memory of 2096 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 28 PID 880 wrote to memory of 2096 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 28 PID 880 wrote to memory of 2096 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 28 PID 880 wrote to memory of 2096 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 28 PID 880 wrote to memory of 2096 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 28 PID 880 wrote to memory of 2096 880 38918f603b2e2bb4c09e69bc5f98cb71.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\38918f603b2e2bb4c09e69bc5f98cb71.exe"C:\Users\Admin\AppData\Local\Temp\38918f603b2e2bb4c09e69bc5f98cb71.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\gciaui.dll",LoadMemory2⤵
- Deletes itself
- Loads dropped DLL
PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109KB
MD55852136820501ec02d1a0cafde2cec10
SHA17f7358b59e351aa24511fa24caa1c230f9727933
SHA256e9748ef7469613f54d792cfcf051e437b8121d162f0ea9d40407a14b8ccea6f7
SHA5124b6790c5dfcfaa1b29213a052df430f26721420de69d3f3b8d64022039e0a877986b2b480f55eb0e58d3861577fe34b3e05c39b445eff1981e4a90243c19c9af