Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
b255bae0b47cfc87db6b1ad7128f4dd6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b255bae0b47cfc87db6b1ad7128f4dd6.exe
Resource
win10v2004-20231222-en
General
-
Target
b255bae0b47cfc87db6b1ad7128f4dd6.exe
-
Size
39KB
-
MD5
b255bae0b47cfc87db6b1ad7128f4dd6
-
SHA1
9875a885a5d2e2a4f78f400673db29cb2b6c7b51
-
SHA256
80b84367feceaba8b9553b496444c1ef02b14a62d7b6b101391f5a6fc522d19c
-
SHA512
409170e28928c886feb6aed285d402891f96f402a5af3090971f6fd6d4cb3a39f8997a7d0348c7c40866af99fe6c73417a60a5f13c4564076e3fe667804d2ad6
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sf88AvvP1oghYvm9/6Dy8P6RA:bIDOw9a0Dwo3P1ojvUSDh0A
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2740 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 b255bae0b47cfc87db6b1ad7128f4dd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2740 2124 b255bae0b47cfc87db6b1ad7128f4dd6.exe 28 PID 2124 wrote to memory of 2740 2124 b255bae0b47cfc87db6b1ad7128f4dd6.exe 28 PID 2124 wrote to memory of 2740 2124 b255bae0b47cfc87db6b1ad7128f4dd6.exe 28 PID 2124 wrote to memory of 2740 2124 b255bae0b47cfc87db6b1ad7128f4dd6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b255bae0b47cfc87db6b1ad7128f4dd6.exe"C:\Users\Admin\AppData\Local\Temp\b255bae0b47cfc87db6b1ad7128f4dd6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5461e5663bcde862b8e054c69c8191cb4
SHA1cdcd7e6f40007bb5f384ddc52eb6badd74b32088
SHA256f2aa458aa448a506ca77bfba81382a5d77ebe65150cac410f4184960bb2ad667
SHA512187540febdbd306a1438141d8b4e6f11e11804e38b57766571d3b20ab285fdd1fc117255f5a44ef11457639b0f6bcce7c6d98d5598c9581241c8040a14da618f