Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
85bc2e8133ed78631bab10a4af9468bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85bc2e8133ed78631bab10a4af9468bb.exe
Resource
win10v2004-20231222-en
General
-
Target
85bc2e8133ed78631bab10a4af9468bb.exe
-
Size
11KB
-
MD5
85bc2e8133ed78631bab10a4af9468bb
-
SHA1
1c409c5ec7fef0b3846a55e78b3a10fffdc4c0db
-
SHA256
6206ac68cac9a9604d95e1b51751e9d369f6777d78fdf54005edd0a4eac8feaf
-
SHA512
e93d176734bb091c31bfbb0943fdfc8401cdcaa1281ef4ba2f6e47a176c38fe7d1c4215339b2c4642236548dc75fbbf28491e0a78097b9f87c9b272837a493d7
-
SSDEEP
192:3ZH+V+cXezwP+OKrG1B141KLQpVgd6VHvk:Z+IcXeUPSrCB1sKLQpVgMHM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1316 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 816 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 2112 85bc2e8133ed78631bab10a4af9468bb.exe 2112 85bc2e8133ed78631bab10a4af9468bb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU Msn = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM Msn = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 816 2112 85bc2e8133ed78631bab10a4af9468bb.exe 28 PID 2112 wrote to memory of 816 2112 85bc2e8133ed78631bab10a4af9468bb.exe 28 PID 2112 wrote to memory of 816 2112 85bc2e8133ed78631bab10a4af9468bb.exe 28 PID 2112 wrote to memory of 816 2112 85bc2e8133ed78631bab10a4af9468bb.exe 28 PID 2112 wrote to memory of 1316 2112 85bc2e8133ed78631bab10a4af9468bb.exe 29 PID 2112 wrote to memory of 1316 2112 85bc2e8133ed78631bab10a4af9468bb.exe 29 PID 2112 wrote to memory of 1316 2112 85bc2e8133ed78631bab10a4af9468bb.exe 29 PID 2112 wrote to memory of 1316 2112 85bc2e8133ed78631bab10a4af9468bb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\85bc2e8133ed78631bab10a4af9468bb.exe"C:\Users\Admin\AppData\Local\Temp\85bc2e8133ed78631bab10a4af9468bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:816
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MDM4624.tmp_melt.bat2⤵
- Deletes itself
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD554cf583fa0f4eecec3459fe70ad512d8
SHA1b804b7be6a7d339695ad3410c64b250c69bd5315
SHA256784e6889fc93b057f49b7acbe44d011ef059837e0f39d1542d5cab79ddc443c5
SHA512ff15489627327951d0ca10793f7521b7bbe562fc2f8c2d3e7484614df0d4546dd25dc4bc9e2d3246c797bd25ac8fc12eab61442e748aa738048872a3301a57d8
-
Filesize
11KB
MD585bc2e8133ed78631bab10a4af9468bb
SHA11c409c5ec7fef0b3846a55e78b3a10fffdc4c0db
SHA2566206ac68cac9a9604d95e1b51751e9d369f6777d78fdf54005edd0a4eac8feaf
SHA512e93d176734bb091c31bfbb0943fdfc8401cdcaa1281ef4ba2f6e47a176c38fe7d1c4215339b2c4642236548dc75fbbf28491e0a78097b9f87c9b272837a493d7