Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
5a4cc471ef6ce33c000269a58dad5ef8.exe
Resource
win7-20231215-en
General
-
Target
5a4cc471ef6ce33c000269a58dad5ef8.exe
-
Size
876KB
-
MD5
5a4cc471ef6ce33c000269a58dad5ef8
-
SHA1
80ba41bd89044f13114aa55f86d1d31d26d694b9
-
SHA256
05c74ed62a5e911d3a6c8389b75576fbb329cb36e7ee7a12f7761bb3eba9cbf6
-
SHA512
683c58886678114d16657ead365ec707facadabef22d7a71ab740ab43ddc3ae9677db57ad3b7c2cd9d4a6384bab5c4a8a8244ca2c576e99ab68a57b7f210373b
-
SSDEEP
24576:ZgqMLKmtvPyHu7EgwY97y9pNg4W7HM8mcN+2QHCvL7:ZRiKmHyOg49/p7s8LQq
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3048 5a4cc471ef6ce33c000269a58dad5ef8.exe 3048 5a4cc471ef6ce33c000269a58dad5ef8.exe 3048 5a4cc471ef6ce33c000269a58dad5ef8.exe 3048 5a4cc471ef6ce33c000269a58dad5ef8.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 5a4cc471ef6ce33c000269a58dad5ef8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2880 wrote to memory of 632 2880 5a4cc471ef6ce33c000269a58dad5ef8.exe 28 PID 2880 wrote to memory of 632 2880 5a4cc471ef6ce33c000269a58dad5ef8.exe 28 PID 2880 wrote to memory of 632 2880 5a4cc471ef6ce33c000269a58dad5ef8.exe 28 PID 2880 wrote to memory of 632 2880 5a4cc471ef6ce33c000269a58dad5ef8.exe 28 PID 2880 wrote to memory of 632 2880 5a4cc471ef6ce33c000269a58dad5ef8.exe 28 PID 2880 wrote to memory of 632 2880 5a4cc471ef6ce33c000269a58dad5ef8.exe 28 PID 2880 wrote to memory of 632 2880 5a4cc471ef6ce33c000269a58dad5ef8.exe 28 PID 632 wrote to memory of 3048 632 5a4cc471ef6ce33c000269a58dad5ef8.exe 29 PID 632 wrote to memory of 3048 632 5a4cc471ef6ce33c000269a58dad5ef8.exe 29 PID 632 wrote to memory of 3048 632 5a4cc471ef6ce33c000269a58dad5ef8.exe 29 PID 632 wrote to memory of 3048 632 5a4cc471ef6ce33c000269a58dad5ef8.exe 29 PID 632 wrote to memory of 3048 632 5a4cc471ef6ce33c000269a58dad5ef8.exe 29 PID 632 wrote to memory of 3048 632 5a4cc471ef6ce33c000269a58dad5ef8.exe 29 PID 632 wrote to memory of 3048 632 5a4cc471ef6ce33c000269a58dad5ef8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a4cc471ef6ce33c000269a58dad5ef8.exe"C:\Users\Admin\AppData\Local\Temp\5a4cc471ef6ce33c000269a58dad5ef8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\5a4cc471ef6ce33c000269a58dad5ef8.exe"C:\Users\Admin\AppData\Local\Temp\5a4cc471ef6ce33c000269a58dad5ef8.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\5a4cc471ef6ce33c000269a58dad5ef8.exe"C:\Users\Admin\AppData\Local\Temp\5a4cc471ef6ce33c000269a58dad5ef8.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5520d1e59c7e4012cf63542fb90847513
SHA1ecef4138237761aba970f3bbcfaed94afa588c76
SHA256ad25bfaaa2fd9a357aeba58a47fd7d146ea3a6d0755cf9ec58250005f2a57906
SHA512265d20eecbe75cfe0a193145237a57b9656f4a2157b09ef5a73be397c91b5232800fb23dc95daf4b2b285bac867f7d10d0215caa00ef9e2251b9a22d4653415c
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5ce44be7b265fc51f44f27ab82ca9fc7c
SHA154b5c1e4e25fd72690838b8fab15bcdd3298f749
SHA256a409baa20b7cf3eb37f311d47a41134198ba33625bfeed1845f044f1268e2abc
SHA512d115f19f9de1a41716e415bf81a010661d5391ac8a9820c242c8d8ea742fe2c69a67da751626752deb2f075bec3e63eec656f0924dbfd6d117eebf64343ccadf