Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 07:44
Behavioral task
behavioral1
Sample
71aa3d84be9fad10b5bc39864f475b7d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
71aa3d84be9fad10b5bc39864f475b7d.exe
Resource
win10v2004-20231215-en
General
-
Target
71aa3d84be9fad10b5bc39864f475b7d.exe
-
Size
10KB
-
MD5
71aa3d84be9fad10b5bc39864f475b7d
-
SHA1
1b3075e186498ed72f2d9b228a9394ed879ebb97
-
SHA256
b3fa60d6486841972d2841d169c7910702c36646d5299b1482e37c97bcb4ba62
-
SHA512
aac9ee26cfcad0cc0d621c02b635225d84f46e2f59cda78068d200be12e4748c0712b5fc4af262b240ee715bf3b9656d5c96ad9c6393399ec58e8add145c5eb6
-
SSDEEP
192:jc4rZ8ByPv/t0XrQz5C/tESfZzsZCvDFFaNJhLkwcud2DH9VwGfctdE:LrqAvVeri5JODTaNJawcudoD7UI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 1B3E.tmp -
Loads dropped DLL 2 IoCs
pid Process 2220 71aa3d84be9fad10b5bc39864f475b7d.exe 2220 71aa3d84be9fad10b5bc39864f475b7d.exe -
resource yara_rule behavioral1/memory/2220-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2220-23-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 2748 regedit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1748 2220 71aa3d84be9fad10b5bc39864f475b7d.exe 28 PID 2220 wrote to memory of 1748 2220 71aa3d84be9fad10b5bc39864f475b7d.exe 28 PID 2220 wrote to memory of 1748 2220 71aa3d84be9fad10b5bc39864f475b7d.exe 28 PID 2220 wrote to memory of 1748 2220 71aa3d84be9fad10b5bc39864f475b7d.exe 28 PID 1748 wrote to memory of 2732 1748 1B3E.tmp 29 PID 1748 wrote to memory of 2732 1748 1B3E.tmp 29 PID 1748 wrote to memory of 2732 1748 1B3E.tmp 29 PID 1748 wrote to memory of 2732 1748 1B3E.tmp 29 PID 2732 wrote to memory of 2748 2732 cmd.exe 31 PID 2732 wrote to memory of 2748 2732 cmd.exe 31 PID 2732 wrote to memory of 2748 2732 cmd.exe 31 PID 2732 wrote to memory of 2748 2732 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\71aa3d84be9fad10b5bc39864f475b7d.exe"C:\Users\Admin\AppData\Local\Temp\71aa3d84be9fad10b5bc39864f475b7d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\1B3E.tmpC:\Users\Admin\AppData\Local\Temp\1B3E.tmp C:\Users\Admin\AppData\Local\Temp2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "c:\WINUPDTE\update.reg"4⤵
- Runs .reg file with regedit
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
470B
MD5d6b8e57c16ba9a9fd84b83b7f1d10b38
SHA1578b29ba9434ab4d3aed03aea30f43c910d03529
SHA25676be5caac62568a2d4fd22b1148c4cbea7039934b8e0390a95812170aeddb268
SHA512378d574020f4a33230cca9fc360af3a8c8bcd98328f72f2be060149a0608f0142df061c2628328beee15c9d6e88e3cd96a8f35e84bb60ed48236fd593babe1ad
-
Filesize
14KB
MD556445d86485d94417fcbf69a0c02fd11
SHA122e0c8f7076f0380bba6ec80f6640e5e933be969
SHA256930609993526b9fcaf657a1dc77960ad1004ba6acb0e5688b49756c1c384046a
SHA512a1b866ad7f448f9cec6843e9801d17269b2eb21df062ed425d046a92b63cb41469f8d3130c8b5c1d3bdca29540f09d442ff8d638f13ee67c720416cf5abe530e