Analysis

  • max time kernel
    177s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 14:03

General

  • Target

    39123dfeba3914c52a6d4c0ededbf5d0.exe

  • Size

    54KB

  • MD5

    39123dfeba3914c52a6d4c0ededbf5d0

  • SHA1

    dd25ddbd99c7ed3c0711494b7fb17099226e19da

  • SHA256

    cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b

  • SHA512

    aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb

  • SSDEEP

    1536:4tqTQMx4H5izeIBBTGr4MScOQ40peZ4S4xM:dJxaRkNTcOT0pdS4xM

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe
    "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\temp3647.tmp"
      2⤵
        PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\39123dfeba3914c52a6d4c0ededbf5d0.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
        2⤵
        • Drops startup file
        PID:2544
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1188
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe" "C:\temp549.tmp"
          3⤵
            PID:2528

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\temp3647.tmp

        Filesize

        54KB

        MD5

        39123dfeba3914c52a6d4c0ededbf5d0

        SHA1

        dd25ddbd99c7ed3c0711494b7fb17099226e19da

        SHA256

        cbb7e5c450ebd0a34eb60717defd11163d085c23a07a5090b15ba542d4c3f77b

        SHA512

        aa500545470731c312d60ab2ecc9ba6eb37d09c29e6d22c6360d81071ea7946f5fd85c469ff3a0b3ae1d0954fb4917de156f7e1cbdcbb9f73884d715e149c8bb

      • memory/1188-17-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-19-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-14-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-15-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-16-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-25-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-18-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-13-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-20-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-21-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-22-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-23-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/1188-24-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB

      • memory/2756-8-0x0000000000400000-0x0000000000416000-memory.dmp

        Filesize

        88KB