Analysis
-
max time kernel
141s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
508d653e1dc1e953dacc1796da64fc46.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
508d653e1dc1e953dacc1796da64fc46.exe
Resource
win10v2004-20231222-en
General
-
Target
508d653e1dc1e953dacc1796da64fc46.exe
-
Size
575KB
-
MD5
508d653e1dc1e953dacc1796da64fc46
-
SHA1
ad79da6da3e640ae041c23ef236f541d393a6974
-
SHA256
a6a5fed28624a737160b463cd57e4423316239f8c89a33a4e1164a27ef2e5b21
-
SHA512
1fd7d4e9681038376805fea399dcc8bdf48fe04cc0a8a0606f1af7145241a1d4a9baddd37a265a6a12a8763a0e60f580a3d5d9604a4201e859cd2c8dd282b6c9
-
SSDEEP
12288:gkxIwYQWP5DKwpoAH2q0hVM9cdQ5H/W4oqI:jx2VKw+AH2q0hVM9BfWuI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1768 wvbgxfd.exe -
Loads dropped DLL 2 IoCs
pid Process 2864 508d653e1dc1e953dacc1796da64fc46.exe 2864 508d653e1dc1e953dacc1796da64fc46.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1768 2864 508d653e1dc1e953dacc1796da64fc46.exe 28 PID 2864 wrote to memory of 1768 2864 508d653e1dc1e953dacc1796da64fc46.exe 28 PID 2864 wrote to memory of 1768 2864 508d653e1dc1e953dacc1796da64fc46.exe 28 PID 2864 wrote to memory of 1768 2864 508d653e1dc1e953dacc1796da64fc46.exe 28
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341KB
MD5efbb8eea377fdb7c97e53e802c06da4d
SHA11b1d5202ac139ae8ade304126713abe2eee1f7f0
SHA25620de0545130d463271d3301b64b6f2c46e3fd2be73721e3ac6fc0fe38e73e8f6
SHA512ad227c0f62cd172a587e464b1fe21f0759ea71970eed37a8748cfb573d9af0c2deb56605641bf04b59e5d0b1834ddad4dbd45ac9a246f23ac01408e64ba35062
-
Filesize
295KB
MD59f1286299182f999acd948a5f5ca9b69
SHA17b12864c532ac75a7449bebf0034f05fbaa62dec
SHA2567c82771dbaffa2bbb271bc95c72ad4bdc42403de50378b0bf32711e568f58ebc
SHA512bcadaf446ec170460705cd6c3939db5d1772aa09d651b1e7c83e0583df9a782907cdd6ede3bb4d326ffa87a4367093573264cbc51583c0d9f5539c94ddfac777
-
Filesize
436KB
MD593d014051fbe73bd85b0d2fc3df30a9a
SHA1333e5e2eff381776aef06c79929242f5ebd0f0a5
SHA25603bdc587a22193f8a7a347cc9d26f8599a458371feae97793d2bbb73f8c761a6
SHA512ebc66022ecce4f0b57f858eafe9756b17408e1cb1ddc84be72fa3966d2e627abb2bab446a1aa775781804cdda9f59e84d96f7a859c527185363226169f5fe85f
-
Filesize
278KB
MD57e2951e59609fb2d2b79657e89db8587
SHA19130fc8f64ac500ee1c4520b4fbfdd94bde1d0fc
SHA2563751e5c740cd1ea95abfdaa125093bbc559dcc5252bcc6854efdd050cf891da0
SHA51263cbd8aa2be98bd51a1b209ccb46149d367a092c2efae15f6748f9b03523c40dd371a28c99eea1551740d5c309159abf3d6371d68d43d074aa3f8550a8d0c04f