Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06-02-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe
Resource
win10v2004-20231215-en
General
-
Target
0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe
-
Size
11.8MB
-
MD5
d7fd6731e4db6fdac15d7ce4844254f0
-
SHA1
32286ffae51a5bc0f14bcf6f7cc10d5040abd8c4
-
SHA256
0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f
-
SHA512
5bb7f1731c892300d67aec81eaa48788690b6abcd9fca5f81dd8830d481d9e6aaf1fa766153b94ad450b6a346b1f48fe8ce4b449062ac476b5ac2cc244315d73
-
SSDEEP
196608:I1rT3Lk6XhNQSKwAk2V80t5AtgNtKpXeBHsepB7/nqlKBlIgj:irbLPXhN1Kpk6t5AtutKpOBppRln
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WW13_64.exepid process 2816 WW13_64.exe -
Loads dropped DLL 2 IoCs
Processes:
0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exeWW13_64.exepid process 2384 0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe 2816 WW13_64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exedescription pid process target process PID 2384 wrote to memory of 2816 2384 0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe WW13_64.exe PID 2384 wrote to memory of 2816 2384 0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe WW13_64.exe PID 2384 wrote to memory of 2816 2384 0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe WW13_64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe"C:\Users\Admin\AppData\Local\Temp\0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\onefile_2384_133517083997780000\WW13_64.exe"C:\Users\Admin\AppData\Local\Temp\0829cd6ebf13b1aa2b01403d19b392ce396d4405e9386fe208ea9b542a625c1f.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD514746bca1ef5d5c4bbedee799736ae9f
SHA12ba7cd5f4cdda33145455b6c70354de6c2b8cdb5
SHA256a2b2768ca9f28c758c4b9680885b4bb148d3d5d9378b807933001c5efa1f3966
SHA5125233a47dcf2412947c87fd029ed7b0a0eb8b7cce70dc17bfeab851bb41c60bc46263a6a69bd8ef274b6256cb68ebb39805b2a4b5125a8fdfca22d7fd59159225
-
Filesize
256KB
MD5716ab8f93a25fd4d2678b77205d56c79
SHA1230c34477874685990355414f3d78efd262c9078
SHA25652cf581f1c2be563652771613431998ee7cfa06aac69ca8268481002a307b45c
SHA51269b4b142db3f5db2ccce76abdcd79b8d3029c90bdfbf35bf75226ad2ad8b6afd3c8c62eafe24ead2251eb233d10d58758421a1d03d42f9afe10d4affd16d3854
-
Filesize
320KB
MD5be5d476906d14284325cb0064694259b
SHA10b5675e2f4847811fb2cf4a437fc4961c5c1e2ce
SHA256800e1894ec3dcb5c6056b321400be06734826bfea760e4af8eeb656134cd997b
SHA5128ce77cb5c1ff84d1342f1609e47f6d9a8e687f1f3fb62a104eb12112dd41916e1831aecc96f6b15a5bf45bd46aee05e791dc5a3b6396ec20d0299f9780a74f31
-
Filesize
136KB
MD56223ddfaeaa15fa6e38ae932d73e11a0
SHA134fcb9316fa3f03dc34924e88ee0c7eb19bb9b4b
SHA2568ea7e6186c33b831aede333a828ccb869ac00dcd252a49951f89259f673a79cc
SHA512ee0fc0bae29a9b36d7f47bf22c994a6ca6749c0a8c2c4de5d7dd5a3a423001d5f4a66b684b1d40e95d86270a4618c2f50482a68fb19c0a0166feb8fe0ab88ba5