Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 11:16
Behavioral task
behavioral1
Sample
5b190e8c3c0c6c4538c966bb67ad26fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b190e8c3c0c6c4538c966bb67ad26fe.exe
Resource
win10v2004-20231215-en
General
-
Target
5b190e8c3c0c6c4538c966bb67ad26fe.exe
-
Size
56KB
-
MD5
5b190e8c3c0c6c4538c966bb67ad26fe
-
SHA1
005adf4ef033a55166fe9794597e26d5796462d6
-
SHA256
53582b607f29afc762b73cb4c17db0f8fc2c127cc5bcd740fd39872daa902f2e
-
SHA512
a264fcb451a5d30647eb84264d177514788d5c455172bea570de9dabb94d954e714aca80caa15f323223ff8efb490649ea3e70d05529579aff74a8b8a2cae97f
-
SSDEEP
768:ys2J4uBAJfqFCs8axiEFaGKIT2+1VTvS/t9YBB/UqPYlArdGpm8MGmTRikY/eZsF:8JAsiaKICETIYQO5UpEGGuAEOB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 123456789.exe -
Loads dropped DLL 2 IoCs
pid Process 2844 5b190e8c3c0c6c4538c966bb67ad26fe.exe 2844 5b190e8c3c0c6c4538c966bb67ad26fe.exe -
resource yara_rule behavioral1/memory/2844-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x00070000000122c9-3.dat upx behavioral1/memory/2736-12-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2844-13-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\RunServices\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce\123456789 = "C:\\Users\\Admin\\AppData\\Local\\123456789.exe" 5b190e8c3c0c6c4538c966bb67ad26fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2844 5b190e8c3c0c6c4538c966bb67ad26fe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2736 2844 5b190e8c3c0c6c4538c966bb67ad26fe.exe 28 PID 2844 wrote to memory of 2736 2844 5b190e8c3c0c6c4538c966bb67ad26fe.exe 28 PID 2844 wrote to memory of 2736 2844 5b190e8c3c0c6c4538c966bb67ad26fe.exe 28 PID 2844 wrote to memory of 2736 2844 5b190e8c3c0c6c4538c966bb67ad26fe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b190e8c3c0c6c4538c966bb67ad26fe.exe"C:\Users\Admin\AppData\Local\Temp\5b190e8c3c0c6c4538c966bb67ad26fe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\123456789.exe"C:\Users\Admin\AppData\Local\123456789.exe"2⤵
- Executes dropped EXE
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD55b190e8c3c0c6c4538c966bb67ad26fe
SHA1005adf4ef033a55166fe9794597e26d5796462d6
SHA25653582b607f29afc762b73cb4c17db0f8fc2c127cc5bcd740fd39872daa902f2e
SHA512a264fcb451a5d30647eb84264d177514788d5c455172bea570de9dabb94d954e714aca80caa15f323223ff8efb490649ea3e70d05529579aff74a8b8a2cae97f