Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
9a723fb229e80471a2ecd08e554cb4ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a723fb229e80471a2ecd08e554cb4ac.exe
Resource
win10v2004-20231222-en
General
-
Target
9a723fb229e80471a2ecd08e554cb4ac.exe
-
Size
3.2MB
-
MD5
9a723fb229e80471a2ecd08e554cb4ac
-
SHA1
b948622c9f0769b4cb0994bb638690b6bbf73d57
-
SHA256
8e0c8a64a47dec2fadfd2088ec4a75926faf5b84fd3a0b724f97e8acffe15d24
-
SHA512
f7839bfc1a456e663539d70ed100bf4ab6cac8aa6bd3809a8a2e7a4a80cae47ad348bf806e351e7ea60ec29d941a2654b7c7a56b4028c77545c9dd5202d0d9b1
-
SSDEEP
98304:ulSdO/Q+jrAHkP3AUm1pkv944Q+2FP0g+:eSw4+wk3rm111BR+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 2836 rkverify.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 2836 rkverify.exe 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2836 rkverify.exe 2836 rkverify.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2836 rkverify.exe 2836 rkverify.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2192 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 28 PID 1200 wrote to memory of 2192 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 28 PID 1200 wrote to memory of 2192 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 28 PID 1200 wrote to memory of 2192 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 28 PID 1200 wrote to memory of 2192 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 28 PID 1200 wrote to memory of 2192 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 28 PID 1200 wrote to memory of 2192 1200 9a723fb229e80471a2ecd08e554cb4ac.exe 28 PID 2192 wrote to memory of 2836 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 29 PID 2192 wrote to memory of 2836 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 29 PID 2192 wrote to memory of 2836 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 29 PID 2192 wrote to memory of 2836 2192 9a723fb229e80471a2ecd08e554cb4ac.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a723fb229e80471a2ecd08e554cb4ac.exe"C:\Users\Admin\AppData\Local\Temp\9a723fb229e80471a2ecd08e554cb4ac.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\is-SNSGI.tmp\9a723fb229e80471a2ecd08e554cb4ac.tmp"C:\Users\Admin\AppData\Local\Temp\is-SNSGI.tmp\9a723fb229e80471a2ecd08e554cb4ac.tmp" /SL5="$4010A,2994332,53248,C:\Users\Admin\AppData\Local\Temp\9a723fb229e80471a2ecd08e554cb4ac.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\is-M1CUU.tmp\rkverify.exe"C:\Users\Admin\AppData\Local\Temp\is-M1CUU.tmp\rkverify.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5580d9673e5ec5d90de1f83e2fd1742c2
SHA10dd94bcc3dc39097bf4bea145356e398665dda4f
SHA256868b1aee31c6335a5fc4257f20346e2d99fbd86bc7554b415da41fc19b13b3b1
SHA512f31f651034ccdaa7ed0bc134186ec56a687495ebf4888fc0d538457684b9f4dbb1b63f38f5881af929ef41e7a4f5d2820e0301118d79e32c4b3c1f1fdef9696b
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
236KB
MD513a90680100cd1dd6e49bb3c8982b671
SHA111cd205b2d87a595bbd762ba34e6f85cc7dbced5
SHA256cc93832d7ebdbe3179c883ec56c7f04122512143910b5b091e01cd63c9a4438e
SHA5120283436e103c02f6ffac99fa4ec4824373c7e77f8627cc4812354ee51029187d446ed98fb1f1f0f204d1d63eaa377e0f7c9511360c213c76662b8a9e25939c51
-
Filesize
669KB
MD552950ac9e2b481453082f096120e355a
SHA1159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA25625fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
SHA5125b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba