Analysis
-
max time kernel
7s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-01-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
471f7a8dce2fbde506b2121224a6a9bf.exe
Resource
win7-20231129-en
General
-
Target
471f7a8dce2fbde506b2121224a6a9bf.exe
-
Size
876KB
-
MD5
471f7a8dce2fbde506b2121224a6a9bf
-
SHA1
c4e20f0b525a9e99b8c93eae575892515129d575
-
SHA256
24e46b71317dd1765ceff1845c9a3b16f6b514d37bb78e99f89ceca4a12ab252
-
SHA512
fff6b9b8eb0f97334d7a105c5b73f8b8f3e58b0cf8e188c223836157bb60d8f306a7b2f8730237604f30d25000624e2ef0bd527b46da9569676db7cd9b6d8670
-
SSDEEP
24576:ZgqMLKmtvPyHu7EgwY97y9pNg4W7HM8mcN+2QHCvL3:ZRiKmHyOg49/p7s8LQG
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2196 471f7a8dce2fbde506b2121224a6a9bf.exe 2196 471f7a8dce2fbde506b2121224a6a9bf.exe 2196 471f7a8dce2fbde506b2121224a6a9bf.exe 2196 471f7a8dce2fbde506b2121224a6a9bf.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 471f7a8dce2fbde506b2121224a6a9bf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2332 2368 471f7a8dce2fbde506b2121224a6a9bf.exe 17 PID 2368 wrote to memory of 2332 2368 471f7a8dce2fbde506b2121224a6a9bf.exe 17 PID 2368 wrote to memory of 2332 2368 471f7a8dce2fbde506b2121224a6a9bf.exe 17 PID 2368 wrote to memory of 2332 2368 471f7a8dce2fbde506b2121224a6a9bf.exe 17 PID 2368 wrote to memory of 2332 2368 471f7a8dce2fbde506b2121224a6a9bf.exe 17 PID 2368 wrote to memory of 2332 2368 471f7a8dce2fbde506b2121224a6a9bf.exe 17 PID 2368 wrote to memory of 2332 2368 471f7a8dce2fbde506b2121224a6a9bf.exe 17 PID 2332 wrote to memory of 2196 2332 471f7a8dce2fbde506b2121224a6a9bf.exe 16 PID 2332 wrote to memory of 2196 2332 471f7a8dce2fbde506b2121224a6a9bf.exe 16 PID 2332 wrote to memory of 2196 2332 471f7a8dce2fbde506b2121224a6a9bf.exe 16 PID 2332 wrote to memory of 2196 2332 471f7a8dce2fbde506b2121224a6a9bf.exe 16 PID 2332 wrote to memory of 2196 2332 471f7a8dce2fbde506b2121224a6a9bf.exe 16 PID 2332 wrote to memory of 2196 2332 471f7a8dce2fbde506b2121224a6a9bf.exe 16 PID 2332 wrote to memory of 2196 2332 471f7a8dce2fbde506b2121224a6a9bf.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5520d1e59c7e4012cf63542fb90847513
SHA1ecef4138237761aba970f3bbcfaed94afa588c76
SHA256ad25bfaaa2fd9a357aeba58a47fd7d146ea3a6d0755cf9ec58250005f2a57906
SHA512265d20eecbe75cfe0a193145237a57b9656f4a2157b09ef5a73be397c91b5232800fb23dc95daf4b2b285bac867f7d10d0215caa00ef9e2251b9a22d4653415c
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
422KB
MD58c8f1fc6f4ccc6e3dcbaa6403647d524
SHA1dfd3c30a683a908f9514c047e844abbea8c24008
SHA2564e67056d70b60c16ee442efa7d75faa2ece6c69f4adbbf71a0ef9a30f842f1b3
SHA512c2eede8944c2bf5ba20d7fca80a7df630085bc24a13afe307d6a4ccaaa2c6bb8a2a83a56e2cb3123506c0ed397bd9188933864ebccbe7bf500027a13a4c7fb6e
-
Filesize
200KB
MD5ce44be7b265fc51f44f27ab82ca9fc7c
SHA154b5c1e4e25fd72690838b8fab15bcdd3298f749
SHA256a409baa20b7cf3eb37f311d47a41134198ba33625bfeed1845f044f1268e2abc
SHA512d115f19f9de1a41716e415bf81a010661d5391ac8a9820c242c8d8ea742fe2c69a67da751626752deb2f075bec3e63eec656f0924dbfd6d117eebf64343ccadf