Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 13:41
Static task
static1
Behavioral task
behavioral1
Sample
8c77bf0b47e8d3ae10f525e131688183.exe
Resource
win7-20231215-en
General
-
Target
8c77bf0b47e8d3ae10f525e131688183.exe
-
Size
874KB
-
MD5
8c77bf0b47e8d3ae10f525e131688183
-
SHA1
926f154649e4fbb55f4f1433ec3c72e66f7cccb2
-
SHA256
0583b343c8b21b26aafc7c235d9dcae7c76ce42d56a3940f63a0008eb4dc2aa5
-
SHA512
9047f34712af634ce26d8254ffc0a78b047b975c99fcc1b320ec3e40e4622dbc36e9b363af284a246d001799b457b392f50f1ef43c776289163bcdd15dd32779
-
SSDEEP
24576:4CMLKmtvPyHu7Dh/jIoy9pNg4W7HMX8G3bOAHCv/:JiKmHyOnNISp7sXju
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 1452 8c77bf0b47e8d3ae10f525e131688183.exe 1452 8c77bf0b47e8d3ae10f525e131688183.exe 1452 8c77bf0b47e8d3ae10f525e131688183.exe 1452 8c77bf0b47e8d3ae10f525e131688183.exe 1452 8c77bf0b47e8d3ae10f525e131688183.exe 1452 8c77bf0b47e8d3ae10f525e131688183.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8c77bf0b47e8d3ae10f525e131688183.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3152 wrote to memory of 2328 3152 8c77bf0b47e8d3ae10f525e131688183.exe 85 PID 3152 wrote to memory of 2328 3152 8c77bf0b47e8d3ae10f525e131688183.exe 85 PID 3152 wrote to memory of 2328 3152 8c77bf0b47e8d3ae10f525e131688183.exe 85 PID 2328 wrote to memory of 1452 2328 8c77bf0b47e8d3ae10f525e131688183.exe 86 PID 2328 wrote to memory of 1452 2328 8c77bf0b47e8d3ae10f525e131688183.exe 86 PID 2328 wrote to memory of 1452 2328 8c77bf0b47e8d3ae10f525e131688183.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c77bf0b47e8d3ae10f525e131688183.exe"C:\Users\Admin\AppData\Local\Temp\8c77bf0b47e8d3ae10f525e131688183.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\8c77bf0b47e8d3ae10f525e131688183.exe"C:\Users\Admin\AppData\Local\Temp\8c77bf0b47e8d3ae10f525e131688183.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\8c77bf0b47e8d3ae10f525e131688183.exe"C:\Users\Admin\AppData\Local\Temp\8c77bf0b47e8d3ae10f525e131688183.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5ad6e05d9ba6ec43731b15a0ff98ae1c0
SHA1c360ec878752a4170bd6842ce91fc51aac84660c
SHA256804680c268cdf42564011784defa437b259de50823245499f7e2635e636bf40b
SHA512ff49dc03e69b52dfd957d4e07b82013006462bb8e6ac24f7d88c62400ec340f2c79d38ca6f8116a9af51c77d08d480778d3c8d56529d11ddcd9cfd167b4e9308
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5525c9dbb9cfafc0d007078dc2d134dff
SHA1f966d327bbcd7825aa11bc39a67ef582a531c306
SHA256fbc468440aed660aab73dac4ed8a736dbc5ef028a8168c84fe605226063a99ee
SHA5120a84c2adfc5fdb791a736adf7810cb1042fe23c9251400adc3f1177edeaefd54dd436f3f9825537bb4cc1d0554583f0a14e00676fbe9068e5f1d9b7c3eaf539f