Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
3f6d1002d337c6f139d2ed95854ad715.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f6d1002d337c6f139d2ed95854ad715.exe
Resource
win10v2004-20231215-en
General
-
Target
3f6d1002d337c6f139d2ed95854ad715.exe
-
Size
652KB
-
MD5
3f6d1002d337c6f139d2ed95854ad715
-
SHA1
8c4fd8254437ceafd67966f9827f676d57170da7
-
SHA256
35e109e8faa97a24f3e05db579bb38e71ed5d024e72da95bceebe8abf25b7629
-
SHA512
114f006079f8b11a90d649e724648d1088c345ba452288e5f064b9b1759bf452d23e1aeb374894cdea65cb08bb06f890bcb34036a9a78e3765a451bcbfc102ac
-
SSDEEP
12288:sVUE7I+n1C863Sp24ufcTOO26Zw/wrjsMnYjX5/804ZsvT85:sVP11uwOVOw/iIOiX50MvT85
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2232 INS96D3.tmp -
Loads dropped DLL 3 IoCs
pid Process 2084 3f6d1002d337c6f139d2ed95854ad715.exe 2232 INS96D3.tmp 2232 INS96D3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2232 INS96D3.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2232 2084 3f6d1002d337c6f139d2ed95854ad715.exe 28 PID 2084 wrote to memory of 2232 2084 3f6d1002d337c6f139d2ed95854ad715.exe 28 PID 2084 wrote to memory of 2232 2084 3f6d1002d337c6f139d2ed95854ad715.exe 28 PID 2084 wrote to memory of 2232 2084 3f6d1002d337c6f139d2ed95854ad715.exe 28 PID 2084 wrote to memory of 2232 2084 3f6d1002d337c6f139d2ed95854ad715.exe 28 PID 2084 wrote to memory of 2232 2084 3f6d1002d337c6f139d2ed95854ad715.exe 28 PID 2084 wrote to memory of 2232 2084 3f6d1002d337c6f139d2ed95854ad715.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f6d1002d337c6f139d2ed95854ad715.exe"C:\Users\Admin\AppData\Local\Temp\3f6d1002d337c6f139d2ed95854ad715.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\INS96D3.tmpC:\Users\Admin\AppData\Local\Temp\INS96D3.tmp /SL3 $110150 C:\Users\Admin\AppData\Local\Temp\3f6d1002d337c6f139d2ed95854ad715.exe 655898 659342 619522⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD59202dd89ff610e35a377a8f644f6b109
SHA109d69bf6bb6356a0915855190a18e269eb11b66e
SHA256b9d0d8d106ca81c716a8c0fd03ea9e2cb7447fc4901aec62240793f9e42a4d6a
SHA51209ff840ead18ecc55f95e6356a92b869ad1197f94b996ef4b9df317c7ed41e4f87a1f1fda34a7d991a933107bfe6f8312b46c2eaa307f7440da75a0f7ae9a33e
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3