Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
535ded1ac6be8b4229c473b7dd2fd409.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
535ded1ac6be8b4229c473b7dd2fd409.exe
Resource
win10v2004-20231215-en
General
-
Target
535ded1ac6be8b4229c473b7dd2fd409.exe
-
Size
2.5MB
-
MD5
535ded1ac6be8b4229c473b7dd2fd409
-
SHA1
9aca7d3f67d5689770a929e3acdf5d83984535bd
-
SHA256
e90f2446257fe800d9717bba35490895588d861bbd6aff6c69919a1dd201253b
-
SHA512
3dc79a18d806d9b4e7985caaf1013110a37a9b78ad98332455345aa359b6ca5172d7fa1aa591f9c9cdd9e75f84e3bd0db7df6add43fb6e13bb976702c9fc0cf0
-
SSDEEP
49152:oky796EvMtTx435MtV+Oj29Ls3t/cwCxHHlc2KP1z8o/MO2Uqed3yBI1r6:o7AEvgVOy29Ls3JslVYzjMO26i1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 2936 WMF.exe -
Loads dropped DLL 5 IoCs
pid Process 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2936 WMF.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1912 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 28 PID 2932 wrote to memory of 1912 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 28 PID 2932 wrote to memory of 1912 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 28 PID 2932 wrote to memory of 1912 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 28 PID 2932 wrote to memory of 1912 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 28 PID 2932 wrote to memory of 1912 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 28 PID 2932 wrote to memory of 1912 2932 535ded1ac6be8b4229c473b7dd2fd409.exe 28 PID 1912 wrote to memory of 2936 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 29 PID 1912 wrote to memory of 2936 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 29 PID 1912 wrote to memory of 2936 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 29 PID 1912 wrote to memory of 2936 1912 535ded1ac6be8b4229c473b7dd2fd409.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\535ded1ac6be8b4229c473b7dd2fd409.exe"C:\Users\Admin\AppData\Local\Temp\535ded1ac6be8b4229c473b7dd2fd409.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\is-6QMO1.tmp\535ded1ac6be8b4229c473b7dd2fd409.tmp"C:\Users\Admin\AppData\Local\Temp\is-6QMO1.tmp\535ded1ac6be8b4229c473b7dd2fd409.tmp" /SL5="$500E0,2280122,153088,C:\Users\Admin\AppData\Local\Temp\535ded1ac6be8b4229c473b7dd2fd409.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\is-SDJ55.tmp\WMF.exe"C:\Users\Admin\AppData\Local\Temp\is-SDJ55.tmp\WMF.exe" /aid=0 /sub=0 /sid=42 /name="8.rar" /fid= /stats=uhXahdQwjgz0bIbFCS1YJKKBJsZ82zBqiwgVpPkbhdKvtnAToRwReyXmsM6LREsoVbTWb+9INw3LdT9Ouchy/w== /param=03⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
995KB
MD5f2b8b3d2e6681d0f1b44be0c2282305c
SHA1c769866afd05248cd30acabdade819213f43fd38
SHA2567cc2c2285b208d936669228c457117363dd94f7ba9d1ff4a59cb8bd96a89c031
SHA51225120c7fe7c3ff297d25788de361c5fe2b14d1294b3aaaea656cea5ec020bebbaa1fedb5294a27cf01a157a36a5fbb6b16238cdb0b4fadda4c25489cebffeb3e
-
Filesize
872KB
MD5d7b1f5253b684125a1cab0755e7ff604
SHA177da1d03161fe0fab1cd8bdcf515c9ac89b957c4
SHA2569b15deed93287a1837486ffca71914deabfd84d5eedef26e74b5daefcae0132c
SHA51258499915fd8952930cfc1d36c6aedcf1c4a44b75df123ae20a1e8c38e5976bb9d3c3f4d6a04473edec6170fdd6d6cb10f596fc9fd304502a86f6f780f226372e
-
Filesize
2KB
MD54c219b78a305d3e52c811542154bb224
SHA17efe3e383b29c808cfb3ad0fd90d627ea7b2b2bf
SHA256a0dbdc08f771e32a5ef06f47b436afb270e860578971a974db0c34c0c1366a7c
SHA512bced9584568b011c0b2013e48d6b9503f77b01c57e2049722326a40363ce42c533e590c4583cf0cf3a5391f3208db8135b5afdc27ae7359af3ded66b11e628b8
-
Filesize
1.1MB
MD58811a0652c18dbcf68955f99df537eb8
SHA170cff6c43c0f873295dc085018639dff02f33012
SHA256d69f51e65e3944891ec9c392b3d7410d81f8f93e55b9071584bfd1d384862230
SHA512ed2ff6cfe272a8ae260233a1bb653adc0eaae13388418a9dea692b9924999d89b8677b8669fa24dcb0c606cfca7045bef779e1c58547f3f17d5096cbbe31d60a
-
Filesize
1.3MB
MD50a9ced8b6a45f06a362ad06dda6fe00d
SHA1108e0f2f3dd648453704b887ac3d8d70be4b009a
SHA2563fd149b1bbbe96e8261ad8f68cb3e26d31f68a3b3660283d31db458479392dc2
SHA5128834bf9987415eecf959835572d609c6850f0718466a4de2fb96751d2ea165736c8ba7d7c52f26dcfcf7f6207a9d23e926c4c75a699deb39f3b2e1aca7be5561
-
Filesize
1.1MB
MD553d39362e8f1213dffab4e85b829b467
SHA1a2cf265536ccd22b1dc1bd62d86ba162d45a4b09
SHA256222875f78cc852e95ef4d20a1348d8f891272f08fe75e03a0f042f99bbd6c087
SHA51260de14273f3497f07c492fee4527a06c8ff6041ea2fd6ca25ca4218ae871383050f5b712e57488d975b344bfbf89a8e19806bf8aea77d24c61087e43c5542deb
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3