Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-01-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
5582cf496275d80528eaa5c3f4783309.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5582cf496275d80528eaa5c3f4783309.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
launchers.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
launchers.exe
Resource
win10v2004-20231215-en
General
-
Target
5582cf496275d80528eaa5c3f4783309.exe
-
Size
55KB
-
MD5
5582cf496275d80528eaa5c3f4783309
-
SHA1
16b795c15c789505d94f53960293e964ad58d2c0
-
SHA256
292f859b49b9578e855e75ad12ec42c643687f2f233344a83a55263aacc4cf64
-
SHA512
7a90c2a3061e28f31d67ae8f196699fd93ba694d51e60b75fcd2c37582da8e7023e6274541a37f27a7d94f6c4b5a4424ee4cf28b07acc1cd219617d4c200dc70
-
SSDEEP
1536:cpgpHzb9dZVX9fHMvG0D3XJE4Romu/Fyd+7qdqa:qgXdZt9P6D3XJE45v+mdqa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2920 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1676 launchers.exe -
Loads dropped DLL 6 IoCs
pid Process 2544 5582cf496275d80528eaa5c3f4783309.exe 2544 5582cf496275d80528eaa5c3f4783309.exe 2544 5582cf496275d80528eaa5c3f4783309.exe 1676 launchers.exe 1676 launchers.exe 1676 launchers.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\·±Ã³ÄÁÆ®·Ñ = "C:\\Users\\Admin\\AppData\\Roaming\\launchers.exe" 5582cf496275d80528eaa5c3f4783309.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\·±Ã³ÄÁÆ®·Ñ = "C:\\Users\\Admin\\AppData\\Roaming\\launchers.exe" 5582cf496275d80528eaa5c3f4783309.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1676 launchers.exe 1676 launchers.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1676 2544 5582cf496275d80528eaa5c3f4783309.exe 21 PID 2544 wrote to memory of 1676 2544 5582cf496275d80528eaa5c3f4783309.exe 21 PID 2544 wrote to memory of 1676 2544 5582cf496275d80528eaa5c3f4783309.exe 21 PID 2544 wrote to memory of 1676 2544 5582cf496275d80528eaa5c3f4783309.exe 21 PID 2544 wrote to memory of 1676 2544 5582cf496275d80528eaa5c3f4783309.exe 21 PID 2544 wrote to memory of 1676 2544 5582cf496275d80528eaa5c3f4783309.exe 21 PID 2544 wrote to memory of 1676 2544 5582cf496275d80528eaa5c3f4783309.exe 21 PID 2544 wrote to memory of 2920 2544 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2544 wrote to memory of 2920 2544 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2544 wrote to memory of 2920 2544 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2544 wrote to memory of 2920 2544 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2544 wrote to memory of 2920 2544 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2544 wrote to memory of 2920 2544 5582cf496275d80528eaa5c3f4783309.exe 19 PID 2544 wrote to memory of 2920 2544 5582cf496275d80528eaa5c3f4783309.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\5582cf496275d80528eaa5c3f4783309.exe"C:\Users\Admin\AppData\Local\Temp\5582cf496275d80528eaa5c3f4783309.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c \DelUS.bat2⤵
- Deletes itself
PID:2920
-
-
C:\Users\Admin\AppData\Roaming\launchers.exeC:\Users\Admin\AppData\Roaming\launchers.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD59c77a47c78d3003a0d6135aedcbed3ac
SHA126b14138e727f4c953dbe42ed2bc08e2c7e704e7
SHA2568052e39a6ec6f0f01d96b80bbbd22e8b3b6275a194de59675727f132ad63c463
SHA51297fd3ee49403cf4219b0caef73803e9722cc247ad209f72a85b6d2bdbaa08549c140ae82ad53ec133fb9dafeb943736084295ab1f7e6813d7ca3a56a7d9b04a8