Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
75f27281487e0895477e670972cc1ffd.exe
Resource
win7-20231215-en
General
-
Target
75f27281487e0895477e670972cc1ffd.exe
-
Size
877KB
-
MD5
75f27281487e0895477e670972cc1ffd
-
SHA1
81b6b568e941c9333ad5e2d355f797ee1e596312
-
SHA256
06248aca0896c44c60dacdd4c255ccc709aa15e030ec7d61df5a55ebb64cd330
-
SHA512
9130c5e14ec8f1645379241d8d861919feca682f1197a05e55a228b259a87a96e9f29baa57957e1db4cd3d7b57be78e8f4a063de01045913b5cf58b20eb578ac
-
SSDEEP
24576:fxMLKmtvPyHu7y17r0nmy9pNg4W7HMc1cN+2QHCU3:piKmHyOQJp7scsQt
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2776 75f27281487e0895477e670972cc1ffd.exe 2776 75f27281487e0895477e670972cc1ffd.exe 2776 75f27281487e0895477e670972cc1ffd.exe 2776 75f27281487e0895477e670972cc1ffd.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 75f27281487e0895477e670972cc1ffd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2156 1900 75f27281487e0895477e670972cc1ffd.exe 28 PID 1900 wrote to memory of 2156 1900 75f27281487e0895477e670972cc1ffd.exe 28 PID 1900 wrote to memory of 2156 1900 75f27281487e0895477e670972cc1ffd.exe 28 PID 1900 wrote to memory of 2156 1900 75f27281487e0895477e670972cc1ffd.exe 28 PID 1900 wrote to memory of 2156 1900 75f27281487e0895477e670972cc1ffd.exe 28 PID 1900 wrote to memory of 2156 1900 75f27281487e0895477e670972cc1ffd.exe 28 PID 1900 wrote to memory of 2156 1900 75f27281487e0895477e670972cc1ffd.exe 28 PID 2156 wrote to memory of 2776 2156 75f27281487e0895477e670972cc1ffd.exe 29 PID 2156 wrote to memory of 2776 2156 75f27281487e0895477e670972cc1ffd.exe 29 PID 2156 wrote to memory of 2776 2156 75f27281487e0895477e670972cc1ffd.exe 29 PID 2156 wrote to memory of 2776 2156 75f27281487e0895477e670972cc1ffd.exe 29 PID 2156 wrote to memory of 2776 2156 75f27281487e0895477e670972cc1ffd.exe 29 PID 2156 wrote to memory of 2776 2156 75f27281487e0895477e670972cc1ffd.exe 29 PID 2156 wrote to memory of 2776 2156 75f27281487e0895477e670972cc1ffd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\75f27281487e0895477e670972cc1ffd.exe"C:\Users\Admin\AppData\Local\Temp\75f27281487e0895477e670972cc1ffd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\75f27281487e0895477e670972cc1ffd.exe"C:\Users\Admin\AppData\Local\Temp\75f27281487e0895477e670972cc1ffd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\75f27281487e0895477e670972cc1ffd.exe"C:\Users\Admin\AppData\Local\Temp\75f27281487e0895477e670972cc1ffd.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD548eb01b0df30e1d62c9f87451ca9cff5
SHA1dd9355cae94c563d2033a7afdc9397de92461fcc
SHA256f6083bff50ac6701e3560d45ed4fd00b3fbd8cc02fc179e09e14c06f26ebc663
SHA512786bb70f39b379ba476a37f52285300c01825d35317842fa5b364626e8626370768fea70be12377d20d3b4c5680e1b2b0665528be5ee7f9b344108ad215671be
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD51429c8bd9f83eec1d15b903c7d1e5e82
SHA13a5cdea59c7161488e10d69989815deb28484c56
SHA25643a94fd12987fe197e694c7a5973030b3b179998813d82dd336877093ae22578
SHA5122b0500f5c51f0c202a0f2ff6c425e9795e42550781406cdb4fecfb1712817a9a603903e07ff14114b7fed33efc7731432cff7a0011c764f3b3c6b5a3cae3e4da