Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
7835523fb2325446824091b9b51eb428.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7835523fb2325446824091b9b51eb428.exe
Resource
win10v2004-20231222-en
General
-
Target
7835523fb2325446824091b9b51eb428.exe
-
Size
2.7MB
-
MD5
7835523fb2325446824091b9b51eb428
-
SHA1
bb7c7b7a38281dd5c8d3ca7e688b4d497ac74888
-
SHA256
2e54b3cd5a16b72d15a495353764944a3ae251ae147833bddf1f09ac8608d9c7
-
SHA512
92aac0b49362618ba73093365e7eaea3e467a20330a89114bc7aa16074b1a734a184bb2d1c3381233de1443124d07050b2853bdba7da8abbcf5c2e3f82db4cb3
-
SSDEEP
49152:k2kJaM0/ILhHD0xpruRN9uM5QBKLfniPUnrudY/ktspwJkbO9JvD+vW8Y/a+:paaMIIKxpruRzuUQB2sUnrudY/sewSOf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2084 7835523fb2325446824091b9b51eb428.tmp 2788 rkverify.exe -
Loads dropped DLL 8 IoCs
pid Process 2504 7835523fb2325446824091b9b51eb428.exe 2084 7835523fb2325446824091b9b51eb428.tmp 2084 7835523fb2325446824091b9b51eb428.tmp 2084 7835523fb2325446824091b9b51eb428.tmp 2084 7835523fb2325446824091b9b51eb428.tmp 2084 7835523fb2325446824091b9b51eb428.tmp 2788 rkverify.exe 2084 7835523fb2325446824091b9b51eb428.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2788 rkverify.exe 2788 rkverify.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 7835523fb2325446824091b9b51eb428.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2788 rkverify.exe 2788 rkverify.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2084 2504 7835523fb2325446824091b9b51eb428.exe 28 PID 2504 wrote to memory of 2084 2504 7835523fb2325446824091b9b51eb428.exe 28 PID 2504 wrote to memory of 2084 2504 7835523fb2325446824091b9b51eb428.exe 28 PID 2504 wrote to memory of 2084 2504 7835523fb2325446824091b9b51eb428.exe 28 PID 2504 wrote to memory of 2084 2504 7835523fb2325446824091b9b51eb428.exe 28 PID 2504 wrote to memory of 2084 2504 7835523fb2325446824091b9b51eb428.exe 28 PID 2504 wrote to memory of 2084 2504 7835523fb2325446824091b9b51eb428.exe 28 PID 2084 wrote to memory of 2788 2084 7835523fb2325446824091b9b51eb428.tmp 29 PID 2084 wrote to memory of 2788 2084 7835523fb2325446824091b9b51eb428.tmp 29 PID 2084 wrote to memory of 2788 2084 7835523fb2325446824091b9b51eb428.tmp 29 PID 2084 wrote to memory of 2788 2084 7835523fb2325446824091b9b51eb428.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7835523fb2325446824091b9b51eb428.exe"C:\Users\Admin\AppData\Local\Temp\7835523fb2325446824091b9b51eb428.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\is-FG8CQ.tmp\7835523fb2325446824091b9b51eb428.tmp"C:\Users\Admin\AppData\Local\Temp\is-FG8CQ.tmp\7835523fb2325446824091b9b51eb428.tmp" /SL5="$30156,2463795,50688,C:\Users\Admin\AppData\Local\Temp\7835523fb2325446824091b9b51eb428.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\is-3GJ1R.tmp\rkverify.exe"C:\Users\Admin\AppData\Local\Temp\is-3GJ1R.tmp\rkverify.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5580d9673e5ec5d90de1f83e2fd1742c2
SHA10dd94bcc3dc39097bf4bea145356e398665dda4f
SHA256868b1aee31c6335a5fc4257f20346e2d99fbd86bc7554b415da41fc19b13b3b1
SHA512f31f651034ccdaa7ed0bc134186ec56a687495ebf4888fc0d538457684b9f4dbb1b63f38f5881af929ef41e7a4f5d2820e0301118d79e32c4b3c1f1fdef9696b
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
236KB
MD513a90680100cd1dd6e49bb3c8982b671
SHA111cd205b2d87a595bbd762ba34e6f85cc7dbced5
SHA256cc93832d7ebdbe3179c883ec56c7f04122512143910b5b091e01cd63c9a4438e
SHA5120283436e103c02f6ffac99fa4ec4824373c7e77f8627cc4812354ee51029187d446ed98fb1f1f0f204d1d63eaa377e0f7c9511360c213c76662b8a9e25939c51
-
Filesize
666KB
MD5022a62afadf6ad59a82329273c6db50d
SHA175202f050bbb8986dda9f0f665b5d56bcc48690d
SHA256e7bf684865dfef9a1cec9925259087a361a98fbedbfe6c4e9e0066299c7fbf58
SHA51201a7ef5ef722774c96f23d17c30884745ae01ebc54017b404408dd86b02ce399595e1d15f6eb5d55c1876aff6a78fd07bde13e9559c07ab659a00cbf7275dd09