Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 03:39
Static task
static1
Behavioral task
behavioral1
Sample
e3e628ebea9019f1c91bb4c0c65ce2a8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e3e628ebea9019f1c91bb4c0c65ce2a8.exe
Resource
win10v2004-20231215-en
General
-
Target
e3e628ebea9019f1c91bb4c0c65ce2a8.exe
-
Size
34KB
-
MD5
e3e628ebea9019f1c91bb4c0c65ce2a8
-
SHA1
15c20b7288427b021ae500addac42ba4bb38a4dd
-
SHA256
172e5cb8d2b50d3484086903e8f34ffff8b2ce464bc9075ca7e33ed17972ce70
-
SHA512
dc98f2ae21e9e1aa7c0799be7ae2b00a587a7c5add7fe51b42e81875f46affce4fddb8562a9f6e92adb3c0c66aaccf5fe847f17e9c993723cdb55da5fb253f79
-
SSDEEP
384:bM7Q0pjC4GybxMv01d3AcASBQMf6i/zzzcYgUPSznHzu02lOQAY6:b/yC4GyNM01GuQMNXw2PSjHC02ltAY6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2404 retln.exe -
Loads dropped DLL 1 IoCs
pid Process 1708 e3e628ebea9019f1c91bb4c0c65ce2a8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1708 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 2404 retln.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2404 1708 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 28 PID 1708 wrote to memory of 2404 1708 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 28 PID 1708 wrote to memory of 2404 1708 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 28 PID 1708 wrote to memory of 2404 1708 e3e628ebea9019f1c91bb4c0c65ce2a8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3e628ebea9019f1c91bb4c0c65ce2a8.exe"C:\Users\Admin\AppData\Local\Temp\e3e628ebea9019f1c91bb4c0c65ce2a8.exe"1⤵
- Loads dropped DLL
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\retln.exe"C:\Users\Admin\AppData\Local\Temp\retln.exe"2⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD59da2dd78bc45df15f99c1f080992a01d
SHA1b6e24f484ad766e129f49033370a2aee8d0c6cd9
SHA256cb30ac5a6fdcf3fc253565b34f7be3068987ad4e617f6f6a074822ba224bc4ec
SHA512795d410edac7c853b3104e425a0e9b21b580a1d4c0344273d34002a912c02605217a5360b8a07b35099670286486625968f3a83d6579e4edba3f5e925a9e235c