Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 08:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
45cdf166f216374dec33d6d69880f711.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
45cdf166f216374dec33d6d69880f711.exe
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
45cdf166f216374dec33d6d69880f711.exe
-
Size
9.6MB
-
MD5
45cdf166f216374dec33d6d69880f711
-
SHA1
84d3084244c824e114806f11775a67ee40908c6c
-
SHA256
03b4406527c93e5faace59c8f96cabe3e93a797df22a15435b6d9c0332bbf61d
-
SHA512
fd3a3b33965a6db885931a8e047603e3fcbce71c32f84f372a3c10de493ce73529e2e2818303a3d5787b9b105cbffdfd83511001168a042f7bb94aadd0d96847
-
SSDEEP
196608:LxF8FeyPAJo6GAeDQU+O/NJo6GAeDQU+O/KAeAY8VOOBsOfyab:bmeyPAJo6ODT+YJo6ODT+7AeA/Vr/yab
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 setup.exe -
Loads dropped DLL 4 IoCs
pid Process 880 45cdf166f216374dec33d6d69880f711.exe 3040 setup.exe 3040 setup.exe 3040 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 880 wrote to memory of 3040 880 45cdf166f216374dec33d6d69880f711.exe 19 PID 880 wrote to memory of 3040 880 45cdf166f216374dec33d6d69880f711.exe 19 PID 880 wrote to memory of 3040 880 45cdf166f216374dec33d6d69880f711.exe 19 PID 880 wrote to memory of 3040 880 45cdf166f216374dec33d6d69880f711.exe 19 PID 880 wrote to memory of 3040 880 45cdf166f216374dec33d6d69880f711.exe 19 PID 880 wrote to memory of 3040 880 45cdf166f216374dec33d6d69880f711.exe 19 PID 880 wrote to memory of 3040 880 45cdf166f216374dec33d6d69880f711.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\45cdf166f216374dec33d6d69880f711.exe"C:\Users\Admin\AppData\Local\Temp\45cdf166f216374dec33d6d69880f711.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\ae13653\setup.exeC:\Users\Admin\AppData\Local\Temp\ae13653\setup.exe -d "C:\Users\Admin\AppData\Local\Temp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040
-