Analysis
-
max time kernel
139s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
41d73c71313f551d126af4884eaba67b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41d73c71313f551d126af4884eaba67b.exe
Resource
win10v2004-20231215-en
General
-
Target
41d73c71313f551d126af4884eaba67b.exe
-
Size
555KB
-
MD5
41d73c71313f551d126af4884eaba67b
-
SHA1
1ee4dd69a83a31b3b35a6dc21ec1d5e6433c5e4d
-
SHA256
e7887edc9282a0c41b0e52e64207ab8fa7bc0e37c32040ebb62e0c7e9c57506e
-
SHA512
c70c27a880a848b1cd4d7d506995b6bcb18ec497f68bf37e0fbcbc040daa5b0d0f9a6ba0a1bdd46b34bdb412c1d0e61da30e23f944da27da705ad4040835cffc
-
SSDEEP
6144:L4u9+06oJ5phYaYY+/DoxeKfIYzQ8fRpD4BEYQ/xWCo4SK:sus7YpIY+/DoxnfIYSX6SK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 uninst001.dat -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4112 41d73c71313f551d126af4884eaba67b.exe 4112 41d73c71313f551d126af4884eaba67b.exe 2844 uninst001.dat 2844 uninst001.dat 2844 uninst001.dat 2844 uninst001.dat 2844 uninst001.dat 2844 uninst001.dat -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4112 41d73c71313f551d126af4884eaba67b.exe 4112 41d73c71313f551d126af4884eaba67b.exe 4112 41d73c71313f551d126af4884eaba67b.exe 2844 uninst001.dat -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4112 wrote to memory of 2844 4112 41d73c71313f551d126af4884eaba67b.exe 89 PID 4112 wrote to memory of 2844 4112 41d73c71313f551d126af4884eaba67b.exe 89 PID 4112 wrote to memory of 2844 4112 41d73c71313f551d126af4884eaba67b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\41d73c71313f551d126af4884eaba67b.exe"C:\Users\Admin\AppData\Local\Temp\41d73c71313f551d126af4884eaba67b.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\uninst001.datC:\Users\Admin\AppData\Local\Temp\41d73c71313f551d126af4884eaba67b.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD571ccb123455c7a8964b1c001475f6c4e
SHA10c87f57ee494da8636cb86dba95aafad494d719c
SHA256f466da1f3c2ee91550b960c321d42224e631b364a1204f03483a58ebd7f00c5d
SHA5128aaaf89ec8a81881e48467959d81f2126b3a87a3ab9274ed2ffa066b236dfe80bc8e3a05f47dc2b9f91a0baf4857f8cbe3439e8749fe00029d6d45862ef931be