Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 03:40
Behavioral task
behavioral1
Sample
4f7ae6da0acc1110ac1a3f3fa08ff73e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f7ae6da0acc1110ac1a3f3fa08ff73e.exe
Resource
win10v2004-20231215-en
General
-
Target
4f7ae6da0acc1110ac1a3f3fa08ff73e.exe
-
Size
181KB
-
MD5
4f7ae6da0acc1110ac1a3f3fa08ff73e
-
SHA1
1862949c76c34107420684d8c2b881efbc404e4d
-
SHA256
59a4cdc57118ed0d37235f02e4b3ec95b52bc9896768f739d69bff7fe919b562
-
SHA512
1d91eabca4198cdedf40493e6f40aa89b3473e5e3ed176ec952f166536e4f8e884fed927b7cccbc2a19f5c507d304a12ec0f3ac9bd740e1df4a4e76acbbaf1df
-
SSDEEP
3072:QOXpHv1O0ToutSNOIE7FS/nEjWeablllA:dpVoSSP1EjWHblll
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2616-1-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2616-150-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SilliconTrend = "C:\\Users\\Admin\\AppData\\Local\\Temp\\runtime.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2264 2616 4f7ae6da0acc1110ac1a3f3fa08ff73e.exe 28 PID 2616 wrote to memory of 2264 2616 4f7ae6da0acc1110ac1a3f3fa08ff73e.exe 28 PID 2616 wrote to memory of 2264 2616 4f7ae6da0acc1110ac1a3f3fa08ff73e.exe 28 PID 2616 wrote to memory of 2264 2616 4f7ae6da0acc1110ac1a3f3fa08ff73e.exe 28 PID 2264 wrote to memory of 2840 2264 cmd.exe 30 PID 2264 wrote to memory of 2840 2264 cmd.exe 30 PID 2264 wrote to memory of 2840 2264 cmd.exe 30 PID 2264 wrote to memory of 2840 2264 cmd.exe 30 PID 2264 wrote to memory of 2792 2264 cmd.exe 31 PID 2264 wrote to memory of 2792 2264 cmd.exe 31 PID 2264 wrote to memory of 2792 2264 cmd.exe 31 PID 2264 wrote to memory of 2792 2264 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f7ae6da0acc1110ac1a3f3fa08ff73e.exe"C:\Users\Admin\AppData\Local\Temp\4f7ae6da0acc1110ac1a3f3fa08ff73e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2491.tmp\load1_link.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "SilliconTrend" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\runtime.exe" /f3⤵
- Adds Run key to start application
PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\runtime.exe""3⤵PID:2792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD55328a4c5895e527512a1d49435cbf0d7
SHA194f7faec7855bebe39f4b6e50596918cc2cb690b
SHA256ca9484bba962de2bd1e29a2a3b2cc307efb6642b5d059fb8d2ed19346725880e
SHA512c40ff6a3458e3e4b9c5ad9249209cf4c6d2b34e875f559af2f0e162cfd2da030fd1472c12af0fc4e89869802159fc7f314781b49340d0ee22c4b882baf4610c3
-
Filesize
4KB
MD509d98f0cc37cc2925cc5d6ff9f09049f
SHA13679b5bed7d75f0bc108f120b4b0d6340811b264
SHA256933107c154d0201e16ec28a6dc28627e5cf2b4c0f2f9f612054aa08f40ee0d60
SHA512ade80b03480424c58c50aadedc47bd171a4e56abfd3cb07f382212d253445f459b46a9d536bd472513d879dbb4b66246246c87ee693efa68f389f734faaa6319