Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
7ed34f4f55d802076317d7cc40717a99.exe
Resource
win7-20231129-en
General
-
Target
7ed34f4f55d802076317d7cc40717a99.exe
-
Size
875KB
-
MD5
7ed34f4f55d802076317d7cc40717a99
-
SHA1
25f6d731a7be831090a0434b4a9cc1c5229e1cfc
-
SHA256
05a5ec40fe63fb9be2a8b5301e5722b06fac6f4386feb623c389e597ba021636
-
SHA512
ac0180b9a5881ee4b5b2d5d16e2724f3b4d29a56a50c75565e9fa8bb9faadc24734a885929a2e0969082c0f845f58e57072bfc23083ea2c6cd97f8fa289500b5
-
SSDEEP
24576:m2MLKmtvPyHu7v8vh4Ay9pNg4W7HMc/cN+2QHC7h:7iKmHyObohtp7scGQI
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 216 7ed34f4f55d802076317d7cc40717a99.exe 216 7ed34f4f55d802076317d7cc40717a99.exe 216 7ed34f4f55d802076317d7cc40717a99.exe 216 7ed34f4f55d802076317d7cc40717a99.exe 216 7ed34f4f55d802076317d7cc40717a99.exe 216 7ed34f4f55d802076317d7cc40717a99.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7ed34f4f55d802076317d7cc40717a99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4344 wrote to memory of 8 4344 7ed34f4f55d802076317d7cc40717a99.exe 54 PID 4344 wrote to memory of 8 4344 7ed34f4f55d802076317d7cc40717a99.exe 54 PID 4344 wrote to memory of 8 4344 7ed34f4f55d802076317d7cc40717a99.exe 54 PID 8 wrote to memory of 216 8 7ed34f4f55d802076317d7cc40717a99.exe 56 PID 8 wrote to memory of 216 8 7ed34f4f55d802076317d7cc40717a99.exe 56 PID 8 wrote to memory of 216 8 7ed34f4f55d802076317d7cc40717a99.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ed34f4f55d802076317d7cc40717a99.exe"C:\Users\Admin\AppData\Local\Temp\7ed34f4f55d802076317d7cc40717a99.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\7ed34f4f55d802076317d7cc40717a99.exe"C:\Users\Admin\AppData\Local\Temp\7ed34f4f55d802076317d7cc40717a99.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\7ed34f4f55d802076317d7cc40717a99.exe"C:\Users\Admin\AppData\Local\Temp\7ed34f4f55d802076317d7cc40717a99.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD58b81ab1d50ab02681d09d8dcac47c30f
SHA10667f7ea3eaa86dd20b94f007ca45aad9f879d74
SHA2561c3dcce719f37907a2bebb4545ba3aea5cb009ce4c525808054c70fe2225e226
SHA512c7724ad37af6ebb7f0fdebfbbf7aab040b7f5a0c6caeb711f00492e692e39a074141ca0d4146cd3d18bc400113fbbcfea72550b8cb67e36fc8311a3208ef8ee5
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD53cfb6a172e5c42e4a337c36260be112e
SHA14531c6f5695c6e0d0b1823682dfe8777c7832b89
SHA256ef3b25201d4d6e26d49d0ccc76926c825d960808cbb396f9cc179363277f2e28
SHA512fae6cb933aa893d99f69a69b61907ff0fd371beadcaf8fa17b1af5ab000c7d7cf4420911e56ba415f56c5873f78edde02f9b19d128987c0f88eebc9dfccaa8d4