Analysis
-
max time kernel
7s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
471f7a8dce2fbde506b2121224a6a9bf.exe
Resource
win7-20231129-en
General
-
Target
471f7a8dce2fbde506b2121224a6a9bf.exe
-
Size
876KB
-
MD5
471f7a8dce2fbde506b2121224a6a9bf
-
SHA1
c4e20f0b525a9e99b8c93eae575892515129d575
-
SHA256
24e46b71317dd1765ceff1845c9a3b16f6b514d37bb78e99f89ceca4a12ab252
-
SHA512
fff6b9b8eb0f97334d7a105c5b73f8b8f3e58b0cf8e188c223836157bb60d8f306a7b2f8730237604f30d25000624e2ef0bd527b46da9569676db7cd9b6d8670
-
SSDEEP
24576:ZgqMLKmtvPyHu7EgwY97y9pNg4W7HM8mcN+2QHCvL3:ZRiKmHyOg49/p7s8LQG
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 1152 471f7a8dce2fbde506b2121224a6a9bf.exe 1152 471f7a8dce2fbde506b2121224a6a9bf.exe 1152 471f7a8dce2fbde506b2121224a6a9bf.exe 1152 471f7a8dce2fbde506b2121224a6a9bf.exe 1152 471f7a8dce2fbde506b2121224a6a9bf.exe 1152 471f7a8dce2fbde506b2121224a6a9bf.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 471f7a8dce2fbde506b2121224a6a9bf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3204 wrote to memory of 1880 3204 471f7a8dce2fbde506b2121224a6a9bf.exe 21 PID 3204 wrote to memory of 1880 3204 471f7a8dce2fbde506b2121224a6a9bf.exe 21 PID 3204 wrote to memory of 1880 3204 471f7a8dce2fbde506b2121224a6a9bf.exe 21 PID 1880 wrote to memory of 1152 1880 471f7a8dce2fbde506b2121224a6a9bf.exe 20 PID 1880 wrote to memory of 1152 1880 471f7a8dce2fbde506b2121224a6a9bf.exe 20 PID 1880 wrote to memory of 1152 1880 471f7a8dce2fbde506b2121224a6a9bf.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56d8f3baeb96bf7f3ff72bd37cf03d72f
SHA1847f31c4e13ae35ef04b6f169e6e07cf5f5aebf9
SHA256ad4ae02a27008707c54f2894b5ebf08a83a6fa217c727cd025d272f956bad796
SHA512b143b453115557ea6b59b494e29e48c96a4c591dc1deb1758ad3ecf9c0b1b8dd73bb3e7a0d1c5540145de506ca825d72ae1b46d77478e65465a4ab806082c09f
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
31KB
MD548abc052199b6c077c6943e526523f70
SHA1768dfafd22359e6c8c6ac665d05b8ebad25f7fd2
SHA2566fdd16c348adc3aa2bf6b085cc4762a91b0f89d9881d5651eaebb770298c475b
SHA5128cbb2b99c2a56e6a8a9634125d0d96813b7f5efa7a000a198f37312f684a2583c85a65bf0cc59e9d70eca9200dd733e1a976392de2229f0dc217b98d8d0d81b5
-
Filesize
1KB
MD5e6e65003507f01912812d3825219f5a2
SHA12888ea9fcb1e3b76e6cffed93e6ceb9e8f3932a5
SHA2561e07d0e144b0af14646dafd8a61067544ca5d761bfca08370c330438c626d92a
SHA5125b120a5cd2ebc0030c536ccb0fa6159e452a67efbe8dcf1031690dee024e0d2c31912af797f34ea2d57aa37204da39b56d2efbaad10dc86eed733dc619c5bbe1