Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
77d015d9b4f83b1882c05f6affd523dc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77d015d9b4f83b1882c05f6affd523dc.exe
Resource
win10v2004-20231215-en
General
-
Target
77d015d9b4f83b1882c05f6affd523dc.exe
-
Size
1.2MB
-
MD5
77d015d9b4f83b1882c05f6affd523dc
-
SHA1
8eb0ed09ec7a5e6dcdc681a532f8867c6f19e1de
-
SHA256
e3737932f2067f8a817956844a4d3bdc5084ea268e8b6c4a6d4d53be5dbb0ae8
-
SHA512
15b9c8364b608f9b1d31e2ea9ede2760bbdbe05f1b86f96c0b7371c8fd74d879dd2087ac6895bd0e3455126aa2ba04e16c7ef1dfaa063dc52028abd29a019677
-
SSDEEP
24576:L20Ndjxn9JJ0+UqzP0VWDeP5OKrdDwOwhR7fF+r9AgY7rmvZf5/I:L2KjJH0VWWOLhBfF+Z7ECvTI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3040 77d015d9b4f83b1882c05f6affd523dc.tmp -
Loads dropped DLL 3 IoCs
pid Process 1272 77d015d9b4f83b1882c05f6affd523dc.exe 3040 77d015d9b4f83b1882c05f6affd523dc.tmp 3040 77d015d9b4f83b1882c05f6affd523dc.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 77d015d9b4f83b1882c05f6affd523dc.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3040 1272 77d015d9b4f83b1882c05f6affd523dc.exe 28 PID 1272 wrote to memory of 3040 1272 77d015d9b4f83b1882c05f6affd523dc.exe 28 PID 1272 wrote to memory of 3040 1272 77d015d9b4f83b1882c05f6affd523dc.exe 28 PID 1272 wrote to memory of 3040 1272 77d015d9b4f83b1882c05f6affd523dc.exe 28 PID 1272 wrote to memory of 3040 1272 77d015d9b4f83b1882c05f6affd523dc.exe 28 PID 1272 wrote to memory of 3040 1272 77d015d9b4f83b1882c05f6affd523dc.exe 28 PID 1272 wrote to memory of 3040 1272 77d015d9b4f83b1882c05f6affd523dc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\77d015d9b4f83b1882c05f6affd523dc.exe"C:\Users\Admin\AppData\Local\Temp\77d015d9b4f83b1882c05f6affd523dc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\is-IHKFG.tmp\77d015d9b4f83b1882c05f6affd523dc.tmp"C:\Users\Admin\AppData\Local\Temp\is-IHKFG.tmp\77d015d9b4f83b1882c05f6affd523dc.tmp" /SL5="$400EC,1014761,54272,C:\Users\Admin\AppData\Local\Temp\77d015d9b4f83b1882c05f6affd523dc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
680KB
MD5e60a74a65005e4c4f61cbe9c09d368df
SHA11d649b2ab5e08632d64e23f5f9e5675b68e184b4
SHA25678f6692d50d07bd78a97294d196f9ae7d1fc48b058375e5d7bb766970faab758
SHA512a73b84739f4da0827976cf473e63ba3dc7649ab2d37be13c8fb786487d0dc7ef5b2bd446d8c745d75266447357bde4f32f58f1f1c92b156f06f141fea2873856