Analysis
-
max time kernel
0s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 05:46
Behavioral task
behavioral1
Sample
55a675d043d984c417fafacbcf846c6e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
55a675d043d984c417fafacbcf846c6e.exe
Resource
win10v2004-20231222-en
General
-
Target
55a675d043d984c417fafacbcf846c6e.exe
-
Size
952KB
-
MD5
55a675d043d984c417fafacbcf846c6e
-
SHA1
877f01a36a2a0a63ea3b40ff3f5fdff644710639
-
SHA256
f244948e24a00795007731776df7ad16618156c8cf48bd7d3065691d2db2562f
-
SHA512
fdddf0a17ed77223d35c2684e671ef642d70cd7549e2561fbab5eb4606b34911a358ffad9c567f8cc3e67045c3b9d9a58603523113dcf121344760889151e9b2
-
SSDEEP
24576:OpZVh3z3WCz6gOGvhign2gq2zVHdlrI1MWstq/wK+IOBFX6AOELmh:OHVhj31z6gjZignU2zT5I1MWsU/wND9M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1836 defender.exe -
resource yara_rule behavioral2/memory/1876-0-0x0000000000400000-0x00000000006E1000-memory.dmp upx behavioral2/memory/1836-14-0x0000000000400000-0x0000000000A0B000-memory.dmp upx behavioral2/files/0x00070000000231f8-12.dat upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1876 55a675d043d984c417fafacbcf846c6e.exe 1876 55a675d043d984c417fafacbcf846c6e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1836 1876 55a675d043d984c417fafacbcf846c6e.exe 22 PID 1876 wrote to memory of 1836 1876 55a675d043d984c417fafacbcf846c6e.exe 22 PID 1876 wrote to memory of 1836 1876 55a675d043d984c417fafacbcf846c6e.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\55a675d043d984c417fafacbcf846c6e.exe"C:\Users\Admin\AppData\Local\Temp\55a675d043d984c417fafacbcf846c6e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
PID:1836
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:756
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1912
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4736
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:3132
-
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:912
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:692
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:5044
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:3940
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:3976
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4088
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3756
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:4628
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2392
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:2412
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:4020
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵PID:3788
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD59f41f86bfb4cf1246133c5a74611b040
SHA15ca031349c75eaad13ad1611b57d683c07b76e55
SHA256474662805ae48d430fa5e4bb824240b468196036b86972f95dcdf1151b442d37
SHA512b5fcbee16776604480c55b7e783173edfb1108f1a3079a15f4950589b88c8ab4d199cc9fcb55dab5eef9e2002094927fd6e91cb9466c1a6b2b3e038c3d6b5f70