Analysis
-
max time kernel
158s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
464d0e5c4095b0d80580f6fae72df891.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
464d0e5c4095b0d80580f6fae72df891.exe
Resource
win10v2004-20231215-en
General
-
Target
464d0e5c4095b0d80580f6fae72df891.exe
-
Size
40KB
-
MD5
464d0e5c4095b0d80580f6fae72df891
-
SHA1
68776b85702728cd90caa08a16d7950d7cbc54f7
-
SHA256
d17e485cf49b3f93d5b561ee23a18eb0b27f7786525e188ea12f3ea46104bc0a
-
SHA512
70199e8450aff593fe217b9123bb7c46b087f07165d84600ea2b390a202c86892bcc33a509a5c2b8df373053378adb786aedafc79383b4207aaa05ad22977126
-
SSDEEP
768:i4gL+UzKWQ3hVRtoVsYxXWwGJmOTr7sxGJliayhuxQWCyh3ZNAdGwCi1Vm6RH2nI:EL+TWGvIXCTUsOazxiytlwCSm0H2bN6
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2224 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Lxowidelu = "rundll32.exe \"C:\\Windows\\Qravemited.dll\",e" rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Qravemited.dll 464d0e5c4095b0d80580f6fae72df891.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2224 1800 464d0e5c4095b0d80580f6fae72df891.exe 93 PID 1800 wrote to memory of 2224 1800 464d0e5c4095b0d80580f6fae72df891.exe 93 PID 1800 wrote to memory of 2224 1800 464d0e5c4095b0d80580f6fae72df891.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\464d0e5c4095b0d80580f6fae72df891.exe"C:\Users\Admin\AppData\Local\Temp\464d0e5c4095b0d80580f6fae72df891.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Windows\Qravemited.dll",e2⤵
- Loads dropped DLL
- Adds Run key to start application
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5dfe60f2218d39deadce978f0c46508a7
SHA143d8de548cda295b5850f9dd720b7699d549eba5
SHA2564ae4905324e1e8ea00407cc6a4799ba30ba03fb7afa11dd40ec5b06c71826e8a
SHA5121c314f987f29e790ae6f7c85f40093647552b706e7fbdcfee01093e918f0fe8eee6d8a918cf23dcffae174863e6b6a03e526e1181a8a05687adf83ccb248a78f