Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09-01-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
4ead0baf33b3ab59615835d5698edcaf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ead0baf33b3ab59615835d5698edcaf.exe
Resource
win10v2004-20231215-en
General
-
Target
4ead0baf33b3ab59615835d5698edcaf.exe
-
Size
234KB
-
MD5
4ead0baf33b3ab59615835d5698edcaf
-
SHA1
6c97ca478d382a8086a1c61a38306928da39f055
-
SHA256
123fd2a5adaff8ba4fd32ec943e07d8319acd78370a501bee269350c159a57c2
-
SHA512
e0c1f318f4e7df9a461d36a710f38057cac4ce216df57d8424c47acae05912210cc267b580f1caef4007019ded5628c4d64414afb8c7ee83abc573dc15206494
-
SSDEEP
1536:CtqTQMx4H5izeIBBTGr4MScOQ45peZ4hZx4:zJxaRkNTcOT5pdhZx4
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 1152 4ead0baf33b3ab59615835d5698edcaf.exe 1152 4ead0baf33b3ab59615835d5698edcaf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2184 1152 4ead0baf33b3ab59615835d5698edcaf.exe 28 PID 1152 wrote to memory of 2184 1152 4ead0baf33b3ab59615835d5698edcaf.exe 28 PID 1152 wrote to memory of 2184 1152 4ead0baf33b3ab59615835d5698edcaf.exe 28 PID 1152 wrote to memory of 2184 1152 4ead0baf33b3ab59615835d5698edcaf.exe 28 PID 1152 wrote to memory of 2144 1152 4ead0baf33b3ab59615835d5698edcaf.exe 30 PID 1152 wrote to memory of 2144 1152 4ead0baf33b3ab59615835d5698edcaf.exe 30 PID 1152 wrote to memory of 2144 1152 4ead0baf33b3ab59615835d5698edcaf.exe 30 PID 1152 wrote to memory of 2144 1152 4ead0baf33b3ab59615835d5698edcaf.exe 30 PID 1152 wrote to memory of 2744 1152 4ead0baf33b3ab59615835d5698edcaf.exe 32 PID 1152 wrote to memory of 2744 1152 4ead0baf33b3ab59615835d5698edcaf.exe 32 PID 1152 wrote to memory of 2744 1152 4ead0baf33b3ab59615835d5698edcaf.exe 32 PID 1152 wrote to memory of 2744 1152 4ead0baf33b3ab59615835d5698edcaf.exe 32 PID 2744 wrote to memory of 2964 2744 lsass.exe 33 PID 2744 wrote to memory of 2964 2744 lsass.exe 33 PID 2744 wrote to memory of 2964 2744 lsass.exe 33 PID 2744 wrote to memory of 2964 2744 lsass.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ead0baf33b3ab59615835d5698edcaf.exe"C:\Users\Admin\AppData\Local\Temp\4ead0baf33b3ab59615835d5698edcaf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\4ead0baf33b3ab59615835d5698edcaf.exe" "C:\temp4510.tmp"2⤵PID:2184
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\4ead0baf33b3ab59615835d5698edcaf.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Drops startup file
PID:2144
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe" "C:\temp9637.tmp"3⤵PID:2964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD54ead0baf33b3ab59615835d5698edcaf
SHA16c97ca478d382a8086a1c61a38306928da39f055
SHA256123fd2a5adaff8ba4fd32ec943e07d8319acd78370a501bee269350c159a57c2
SHA512e0c1f318f4e7df9a461d36a710f38057cac4ce216df57d8424c47acae05912210cc267b580f1caef4007019ded5628c4d64414afb8c7ee83abc573dc15206494