Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
54a08c392f08e4e0feebbed5b96422fa.exe
Resource
win7-20231215-en
General
-
Target
54a08c392f08e4e0feebbed5b96422fa.exe
-
Size
877KB
-
MD5
54a08c392f08e4e0feebbed5b96422fa
-
SHA1
5feeba2cdb5cebfe3189a060d08512473ba88fcf
-
SHA256
24d6dd8629a5f08d047c1284625f5a29c516bacf6b2c7811174a2ffa46f5ab10
-
SHA512
13c8b1d8d1cbfeab247b370baf903a12fe65192cd6e46f3096b7687ccfc11829be4c535f5acb1909a801f6636eacd4c5f111fb340e9e70a161b3ab156856ceb6
-
SSDEEP
24576:HEMLKmtvPyHu7krn8y9pNg4W7HM8mcN+2QHCK8n:kiKmHyOIrep7s8LQC
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 2036 54a08c392f08e4e0feebbed5b96422fa.exe 2036 54a08c392f08e4e0feebbed5b96422fa.exe 2036 54a08c392f08e4e0feebbed5b96422fa.exe 2036 54a08c392f08e4e0feebbed5b96422fa.exe 2036 54a08c392f08e4e0feebbed5b96422fa.exe 2036 54a08c392f08e4e0feebbed5b96422fa.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 54a08c392f08e4e0feebbed5b96422fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3068 1596 54a08c392f08e4e0feebbed5b96422fa.exe 90 PID 1596 wrote to memory of 3068 1596 54a08c392f08e4e0feebbed5b96422fa.exe 90 PID 1596 wrote to memory of 3068 1596 54a08c392f08e4e0feebbed5b96422fa.exe 90 PID 3068 wrote to memory of 2036 3068 54a08c392f08e4e0feebbed5b96422fa.exe 89 PID 3068 wrote to memory of 2036 3068 54a08c392f08e4e0feebbed5b96422fa.exe 89 PID 3068 wrote to memory of 2036 3068 54a08c392f08e4e0feebbed5b96422fa.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\54a08c392f08e4e0feebbed5b96422fa.exe"C:\Users\Admin\AppData\Local\Temp\54a08c392f08e4e0feebbed5b96422fa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\54a08c392f08e4e0feebbed5b96422fa.exe"C:\Users\Admin\AppData\Local\Temp\54a08c392f08e4e0feebbed5b96422fa.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\54a08c392f08e4e0feebbed5b96422fa.exe"C:\Users\Admin\AppData\Local\Temp\54a08c392f08e4e0feebbed5b96422fa.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD568161bc336d89500856f57b5b5cecbdb
SHA1e6511a18c0889dd537c0998cf3d91f3ac392be8a
SHA25674421645c00e781b881ca70124c6168bedbd0f18a8892fd20935d3935ebf401f
SHA5121ca10f7b7c8467fab45d48df04364257e03f1f98f72a49041b924e28b093bbbefbe2e2f932a51e1934bf31728ff7807e656666bac0cb9725f12f2038e7d7f1c9
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD52c012670cbf59999692e050bcfb9f0ba
SHA10fc508152a8f89f0e7a551fbb9efdf87032a5170
SHA2562639d99468ea2951422826d32c211abb10658ed4a1d2ee11688aae070a7b8256
SHA512aa9cd66dbae305f3fb56b29bd3877ea5c4c519a3c69c52f51897530862c6b8d5aec657d8afa4c2c4c0552ccfdc7223e9bb8ca416fdc6d5fa31d556815ee0d35a