Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
38a7650d049798d3cdde44b30fcb182b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38a7650d049798d3cdde44b30fcb182b.exe
Resource
win10v2004-20231222-en
General
-
Target
38a7650d049798d3cdde44b30fcb182b.exe
-
Size
2.2MB
-
MD5
38a7650d049798d3cdde44b30fcb182b
-
SHA1
eb569cb9deeb04c9afd3c9bfe79bc90e67f7ea4e
-
SHA256
499dcf9011ea82fedd4a93045126d7ac43ceb0740fdfeac57d5e2c482e913d96
-
SHA512
f3fc18cb1dbd50abed98c25b7313b67e2493eeba626bfa9b0d719fab0917cccba8ea95404e97b5eab2841e0ef010ac1e42667b7005799be04a179af3b4449b78
-
SSDEEP
49152:kUv8Lkr77yfUN1KC9Bk2sC3cK5cswOmrz0zju997LCrBErCVa:nikr7g21fjkFCsK5Dyrz4jU2SuVa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 is-PK2BV.tmp -
Loads dropped DLL 3 IoCs
pid Process 1272 38a7650d049798d3cdde44b30fcb182b.exe 3040 is-PK2BV.tmp 3040 is-PK2BV.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 is-PK2BV.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3040 1272 38a7650d049798d3cdde44b30fcb182b.exe 17 PID 1272 wrote to memory of 3040 1272 38a7650d049798d3cdde44b30fcb182b.exe 17 PID 1272 wrote to memory of 3040 1272 38a7650d049798d3cdde44b30fcb182b.exe 17 PID 1272 wrote to memory of 3040 1272 38a7650d049798d3cdde44b30fcb182b.exe 17 PID 1272 wrote to memory of 3040 1272 38a7650d049798d3cdde44b30fcb182b.exe 17 PID 1272 wrote to memory of 3040 1272 38a7650d049798d3cdde44b30fcb182b.exe 17 PID 1272 wrote to memory of 3040 1272 38a7650d049798d3cdde44b30fcb182b.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\38a7650d049798d3cdde44b30fcb182b.exe"C:\Users\Admin\AppData\Local\Temp\38a7650d049798d3cdde44b30fcb182b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\is-1QMSO.tmp\is-PK2BV.tmp"C:\Users\Admin\AppData\Local\Temp\is-1QMSO.tmp\is-PK2BV.tmp" /SL4 $400EC C:\Users\Admin\AppData\Local\Temp\38a7650d049798d3cdde44b30fcb182b.exe 2241457 1044482⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
381KB
MD502bed163220b783c2d1b6bea9443bcf2
SHA144af46c1db9d4e4a12ec93baf4a8d94afee7e3eb
SHA256e0540e6b19bd898dc40e92cb04a0c288a4386219e2b3d2320ce76bf82f6c12be
SHA51227cab76a6e08e8c4b4d4abe52ad84799441d87dbba7a78857ed71a6d901b8dcba6f3fd1ececf1e3822fd138a5f19dba50ee2f02957f7d3f7b1b3c3bded1ca467