Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
9938503279735aa17b02a1aa98f83ef2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9938503279735aa17b02a1aa98f83ef2.exe
Resource
win10v2004-20231222-en
General
-
Target
9938503279735aa17b02a1aa98f83ef2.exe
-
Size
3.0MB
-
MD5
9938503279735aa17b02a1aa98f83ef2
-
SHA1
5d3f88f6105b32854beffb6401cfd32764ebb47f
-
SHA256
2f92c11d971fd8c81c92907537fd47c4c1d06a68153b215a12a6ca969d431045
-
SHA512
768d6247f07a6cd4f11f784a449f93613366fa4570d35753c5a11913ff9122f5543be8edaf11e82a854dfa0b0e888e796b3931d21360eeb6deb3e52cc325553c
-
SSDEEP
49152:Z2Irtt5yWwI74FGxeScEDVFw6+F8r7A/wAJ9yPGTzNmvrv6gWNd5lax9A:MIrtFwI76QcEO6+hZJ9mGfNmzygMlaw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4588 is-QL7H3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4588 3768 9938503279735aa17b02a1aa98f83ef2.exe 83 PID 3768 wrote to memory of 4588 3768 9938503279735aa17b02a1aa98f83ef2.exe 83 PID 3768 wrote to memory of 4588 3768 9938503279735aa17b02a1aa98f83ef2.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9938503279735aa17b02a1aa98f83ef2.exe"C:\Users\Admin\AppData\Local\Temp\9938503279735aa17b02a1aa98f83ef2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\is-2QJEE.tmp\is-QL7H3.tmp"C:\Users\Admin\AppData\Local\Temp\is-2QJEE.tmp\is-QL7H3.tmp" /SL4 $90064 "C:\Users\Admin\AppData\Local\Temp\9938503279735aa17b02a1aa98f83ef2.exe" 2894017 527362⤵
- Executes dropped EXE
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
659KB
MD51a2034e242fdbe78c5fc5785617d98a0
SHA14a8ee0001826eaeed49483e73f007923275b859b
SHA256c63a6300a825213fd3cce7b94c3d08274f7681500b230a5e94a7e47f6e2782a4
SHA5123aac63280d95dee25535df538ba85d8357aedd08be9c9d721d3fa638f1e3199905a83f17b1d5c1777f923a0a9ae7fe1ff74fc2c217837216f4030e2f61299066