Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
5216fd53ed68733bbfaaf9117dba498b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5216fd53ed68733bbfaaf9117dba498b.exe
Resource
win10v2004-20231215-en
General
-
Target
5216fd53ed68733bbfaaf9117dba498b.exe
-
Size
860KB
-
MD5
5216fd53ed68733bbfaaf9117dba498b
-
SHA1
fae526ec0551bff0f8fe9ba0c7feec8a5dd3b81e
-
SHA256
7152dd020782605ade398ea8cb0e58087da48c6b056f365c6081d9b34583f553
-
SHA512
72f3f602c43249a500bde458909db6eff05258844db3aa7b3b27126d568eb921a32e8189998f8d9333a1febb34976b7b329c1b0126cd20837a1dbb4bd9f26cdf
-
SSDEEP
24576:T1BIvMNYx35lfKIMqHnWdOt/ZDShNcLz5BNczxvgo/Hc:TgMNyLyaHWdO9FSh4Oxvf/c
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1628 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 03490420.exe -
Loads dropped DLL 5 IoCs
pid Process 2608 cmd.exe 2608 cmd.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\03490420 = "C:\\ProgramData\\03490420\\03490420.exe" 5216fd53ed68733bbfaaf9117dba498b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\03490420 = "C:\\PROGRA~3\\03490420\\03490420.exe" 03490420.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2696 03490420.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe 2696 03490420.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1628 2032 5216fd53ed68733bbfaaf9117dba498b.exe 28 PID 2032 wrote to memory of 1628 2032 5216fd53ed68733bbfaaf9117dba498b.exe 28 PID 2032 wrote to memory of 1628 2032 5216fd53ed68733bbfaaf9117dba498b.exe 28 PID 2032 wrote to memory of 1628 2032 5216fd53ed68733bbfaaf9117dba498b.exe 28 PID 1628 wrote to memory of 2608 1628 cmd.exe 30 PID 1628 wrote to memory of 2608 1628 cmd.exe 30 PID 1628 wrote to memory of 2608 1628 cmd.exe 30 PID 1628 wrote to memory of 2608 1628 cmd.exe 30 PID 2608 wrote to memory of 2696 2608 cmd.exe 31 PID 2608 wrote to memory of 2696 2608 cmd.exe 31 PID 2608 wrote to memory of 2696 2608 cmd.exe 31 PID 2608 wrote to memory of 2696 2608 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5216fd53ed68733bbfaaf9117dba498b.exe"C:\Users\Admin\AppData\Local\Temp\5216fd53ed68733bbfaaf9117dba498b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\03490420\03490420.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\03490420\03490420.exe /i3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\PROGRA~3\03490420\03490420.exeC:\PROGRA~3\03490420\03490420.exe /i4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
860KB
MD55216fd53ed68733bbfaaf9117dba498b
SHA1fae526ec0551bff0f8fe9ba0c7feec8a5dd3b81e
SHA2567152dd020782605ade398ea8cb0e58087da48c6b056f365c6081d9b34583f553
SHA51272f3f602c43249a500bde458909db6eff05258844db3aa7b3b27126d568eb921a32e8189998f8d9333a1febb34976b7b329c1b0126cd20837a1dbb4bd9f26cdf
-
Filesize
230B
MD554b544507151621e2392d03272d54b68
SHA1b004a4f0c5fb158d0790bb1b7eacade1e2bc8ada
SHA2564218b351c18d3e960fd2e2cbf3fc1a6e02f03401866f36c2be7e4b4d62cfd5ce
SHA512921d2fb4291b66759849176c108bf1453945ab3f4c4448849f225333a9e23f03dbfdf77ec2a436895c51d40efed295399ffcdb9fce8821cd76530c9ca122849f