Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 22:34
Static task
static1
Behavioral task
behavioral1
Sample
51ccdc20e450c623de8c76ed494336b4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51ccdc20e450c623de8c76ed494336b4.exe
Resource
win10v2004-20231215-en
General
-
Target
51ccdc20e450c623de8c76ed494336b4.exe
-
Size
1.9MB
-
MD5
51ccdc20e450c623de8c76ed494336b4
-
SHA1
afdaa8e4c039e702b02ce3d44d0988cf87869f86
-
SHA256
30bdd4958bbf8d1366decd44945aa166c45e3fc862b162951a964fc24969bfaa
-
SHA512
aced1a3ab10709dfc32f61f0913ca941511d3674e1980f2a8911ccbd88c80e3376e64cb8578320b7d8663adab38b44f3b62cd23e36805a072b2e53a0b5d81a12
-
SSDEEP
49152:v2oABKC/EkXuq2GEwge9DFT8MMsuZORoaM4jaV:uoABK2EkxExezoZF4M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1076 51ccdc20e450c623de8c76ed494336b4.tmp -
Loads dropped DLL 4 IoCs
pid Process 2608 51ccdc20e450c623de8c76ed494336b4.exe 1076 51ccdc20e450c623de8c76ed494336b4.tmp 1076 51ccdc20e450c623de8c76ed494336b4.tmp 1076 51ccdc20e450c623de8c76ed494336b4.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1076 51ccdc20e450c623de8c76ed494336b4.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1076 2608 51ccdc20e450c623de8c76ed494336b4.exe 14 PID 2608 wrote to memory of 1076 2608 51ccdc20e450c623de8c76ed494336b4.exe 14 PID 2608 wrote to memory of 1076 2608 51ccdc20e450c623de8c76ed494336b4.exe 14 PID 2608 wrote to memory of 1076 2608 51ccdc20e450c623de8c76ed494336b4.exe 14 PID 2608 wrote to memory of 1076 2608 51ccdc20e450c623de8c76ed494336b4.exe 14 PID 2608 wrote to memory of 1076 2608 51ccdc20e450c623de8c76ed494336b4.exe 14 PID 2608 wrote to memory of 1076 2608 51ccdc20e450c623de8c76ed494336b4.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\is-37DFU.tmp\51ccdc20e450c623de8c76ed494336b4.tmp"C:\Users\Admin\AppData\Local\Temp\is-37DFU.tmp\51ccdc20e450c623de8c76ed494336b4.tmp" /SL5="$40152,1555768,53248,C:\Users\Admin\AppData\Local\Temp\51ccdc20e450c623de8c76ed494336b4.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1076
-
C:\Users\Admin\AppData\Local\Temp\51ccdc20e450c623de8c76ed494336b4.exe"C:\Users\Admin\AppData\Local\Temp\51ccdc20e450c623de8c76ed494336b4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5802eee5a8f882330c623e0685745d913
SHA1277ccead0e12dd3c089e7c9cbfd80d5751b609a1
SHA2563b0f7ef3a1234ebc6e8bdffbfdd34c0abb384444bb1670d5c0ee154f1243163e
SHA512d21c5c48f39ce38d0df391b9ce1682190d90c298886ce4cb9e6a0890b39ae5b58038b5cd91da3bed7f4544f805b63e082da779782a3ee9de44ce0ba5000b87cf
-
Filesize
45KB
MD55ee515591ae9ecdae9290bd2488ba618
SHA1282971d00482bfd52bffa7dc51b270c158413ff4
SHA25659dd111c44106acde167271987e6f8908457d9b6daf77212f1dc06f5be0103e6
SHA51265cca152a188381a18c8b3bc4cd55a9b8a03356d5d9ac336a86a217ef7e017227944a7ad8c370c21d1b0fec1393adc26919d2f058177861bd73c92a47ecf39d4
-
Filesize
161B
MD561593d97dee8ca54fb07716b7e96cd7e
SHA1ddd95395ca661002a5126b4fd309f0a4544939d2
SHA256b0ab99788e42f815657de13b62c7e23e7ef49b6b7ef564014ba8af513d402165
SHA512b01aca457a31f7137a09ba2bc08b56c936e6ffe9cb8c4f448f050293958e887717364eef10ceeb5cd72039559b02feb7ce1d62bd94f3386cb546af3d6bb023f2
-
Filesize
41KB
MD567c9a094e96e89c0b148004777319482
SHA14919dbdf1dbf7795716b68944794db32c09bfbc9
SHA2563e501720bd8b252bb2432fa97fed16ba8609cb2bd96bdd57a5e88eba7f4e507f
SHA512eda03aaba1dcd52fbe6db9d4f1a1640964661ae94185902ba27384b2efb427d6d305f7d8fb6c4b23c16a1d57348b57bfa4ba60d3d47258d8e76efc9a4ec5b0bc
-
Filesize
14KB
MD5190fcf542a84bca579e7971ce30d761e
SHA108afb1c9a1780384959e0ab1661ffc788cb10b8d
SHA256181b1763a322fff029d1bdac7ea18646977814f81b2af10c2c79b8139143796f
SHA5121b4bc3300c971b4bae343c56da2902489342c79382e4d71b56139ce86a449a23ae3155d5d70abc95ebbe15900ff94f24a81a5364b75daa2304706efe668deca3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1KB
MD5c47fba22a433b368596405ec17330071
SHA169817481bfca2db34ac65dab83630a0c4952af8d
SHA25648c1b4d2da869d1535d61d338e3f56b1e9994b9b82355f894fe843d901842e2b
SHA5120d4504893dbb1c9ca312e38b181d00303d9e763376668fadaf08a659f1c117ddc3163ae071c04d20b7af25137813e489c1ea866f73b0cc8f63b49a3e68891dc3