Analysis
-
max time kernel
177s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 14:03
Static task
static1
Behavioral task
behavioral1
Sample
39123dfeba3914c52a6d4c0ededbf5d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39123dfeba3914c52a6d4c0ededbf5d0.exe
Resource
win10v2004-20231222-en
General
-
Target
39123dfeba3914c52a6d4c0ededbf5d0.exe
-
Size
54KB
-
MD5
39123dfeba3914c52a6d4c0ededbf5d0
-
SHA1
dd25ddbd99c7ed3c0711494b7fb17099226e19da
-
SHA256
cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b
-
SHA512
aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb
-
SSDEEP
1536:4tqTQMx4H5izeIBBTGr4MScOQ40peZ4S4xM:dJxaRkNTcOT0pdS4xM
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2752 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 28 PID 2756 wrote to memory of 2752 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 28 PID 2756 wrote to memory of 2752 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 28 PID 2756 wrote to memory of 2752 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 28 PID 2756 wrote to memory of 2544 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 32 PID 2756 wrote to memory of 2544 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 32 PID 2756 wrote to memory of 2544 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 32 PID 2756 wrote to memory of 2544 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 32 PID 2756 wrote to memory of 1188 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 34 PID 2756 wrote to memory of 1188 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 34 PID 2756 wrote to memory of 1188 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 34 PID 2756 wrote to memory of 1188 2756 39123dfeba3914c52a6d4c0ededbf5d0.exe 34 PID 1188 wrote to memory of 2528 1188 lsass.exe 35 PID 1188 wrote to memory of 2528 1188 lsass.exe 35 PID 1188 wrote to memory of 2528 1188 lsass.exe 35 PID 1188 wrote to memory of 2528 1188 lsass.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe"C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\temp3647.tmp"2⤵PID:2752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Drops startup file
PID:2544
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe" "C:\temp549.tmp"3⤵PID:2528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD539123dfeba3914c52a6d4c0ededbf5d0
SHA1dd25ddbd99c7ed3c0711494b7fb17099226e19da
SHA256cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b
SHA512aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb