Analysis
-
max time kernel
92s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
7050c4053e466c58e67b0d8303f338ab.exe
Resource
win7-20231215-en
General
-
Target
7050c4053e466c58e67b0d8303f338ab.exe
-
Size
875KB
-
MD5
7050c4053e466c58e67b0d8303f338ab
-
SHA1
20f11fa8bf3e890a110468c410716fa4f5c57884
-
SHA256
14ef98932bc5fbb1c2ec62c2379757843edc781f4d5583eef14751874277ce0f
-
SHA512
5be9aeb67d9ee64b461c4dd500d0a600e1641421e823399a1ca1e56aa6f0c77d65ead1f80ad222a24a88f226addafa7607e7e0942fa9bfc97bf29633ae278446
-
SSDEEP
24576:BOMLKmtvPyHu7UtwdOy9pNg4W7HM8mcN+2QHCQX:QiKmHyO4tPp7s8LQB
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 4972 7050c4053e466c58e67b0d8303f338ab.exe 4972 7050c4053e466c58e67b0d8303f338ab.exe 4972 7050c4053e466c58e67b0d8303f338ab.exe 4972 7050c4053e466c58e67b0d8303f338ab.exe 4972 7050c4053e466c58e67b0d8303f338ab.exe 4972 7050c4053e466c58e67b0d8303f338ab.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7050c4053e466c58e67b0d8303f338ab.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4584 2056 7050c4053e466c58e67b0d8303f338ab.exe 27 PID 2056 wrote to memory of 4584 2056 7050c4053e466c58e67b0d8303f338ab.exe 27 PID 2056 wrote to memory of 4584 2056 7050c4053e466c58e67b0d8303f338ab.exe 27 PID 4584 wrote to memory of 4972 4584 7050c4053e466c58e67b0d8303f338ab.exe 23 PID 4584 wrote to memory of 4972 4584 7050c4053e466c58e67b0d8303f338ab.exe 23 PID 4584 wrote to memory of 4972 4584 7050c4053e466c58e67b0d8303f338ab.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD56d07371fc32a05058d034e32afe5db83
SHA122023abeb6d829f409ecd3463d8034549239a49c
SHA2561d9b3b58330262b04334986dd7748608ceb1f58641d6ce43c51d8663ed576385
SHA51219e94370cc4a1da0aa80584ecb95a2ff5c839d71e33042f95dbbd8e40f1b991e90b9abe965aaf0d639a9ca3b73572ef004f8764407352e94935fe2e6ef226478
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
97KB
MD5b16a55085bf2dce99fd8597882010061
SHA1eb159583753f8090558e4b878c8a940a9d1294ff
SHA256c942f39504800f6219a02efc988347114ace2ade2f93214cd08c6c235a9a88a1
SHA512d02ef2f86ccd07ddd3871b563feed7431708c6f75520e2239527986f74264ddfd08e6c6350f5f93386f0b9353ad1bf249779e8ee3d9476d1f38c54a67379dc90
-
Filesize
166KB
MD5af6d398035862876ca8828b3a10e8ba9
SHA1964a7f91c2a28bb5df69afce99da67f60351ac6b
SHA2564c8bac9969021f422cb337594a21d0cc74cd05503e4df21d7a4d17150392e4b4
SHA512518c7facb2867a25af3c6938622b092712483118a9bcfb2caff633cd0cc8cc6658e3fb4a73acbad5936321e074ec5c85146c4197b7653e6686ea266ffb647368
-
Filesize
200KB
MD5a865a0c4ff5e036a811cecadc527471e
SHA1fabc08d74f38b79afbd07e0c426875d8d063996c
SHA2569242243de3bfc8fa082b1d972699592afc76ca67bc69ff7fe6026f748feae63e
SHA512bdcc2f150dd265ba5b8ad8a38fcbcde53a669308823bd4624cbad208e1c404c08a1426855dd230bbf95adc9d46e312c0470f7e90761aac265c1789d4099d9925