Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe
Resource
win10v2004-20231215-en
General
-
Target
d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe
-
Size
3.4MB
-
MD5
3117bf9274374480ea7b7165786dd3e6
-
SHA1
5c2b9be474186ae10e884ffc15844191c2d144ae
-
SHA256
d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83
-
SHA512
b214abf62646fd10426b79405e2c67cfbed654bbd7e333cc08d88adfec74d269c60fb5b0a8c696fa8107897792228dab34af76f884f237cff1342762c6362e94
-
SSDEEP
49152:QI1BMSvHH9sufzgtSN9t9/y8MH31Q+QVc5GxJxn+mqEvzHyZsUocVIIR6qW+LKNi:QDSvxrg+t9/ypFQ+QuKJ9TyZ9JKc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1668 ak.exe 2008 ak.exe -
Loads dropped DLL 3 IoCs
pid Process 2268 d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe 1668 ak.exe 2008 ak.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1668 2268 d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe 28 PID 2268 wrote to memory of 1668 2268 d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe 28 PID 2268 wrote to memory of 1668 2268 d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe 28 PID 2268 wrote to memory of 1668 2268 d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe 28 PID 1668 wrote to memory of 2008 1668 ak.exe 29 PID 1668 wrote to memory of 2008 1668 ak.exe 29 PID 1668 wrote to memory of 2008 1668 ak.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe"C:\Users\Admin\AppData\Local\Temp\d3829c6ecc883d62e2bfcee24edec9bb49aae6eb315f22b08a3c668d66e6bf83.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ak.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ak.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\onefile_1668_133527583987072000\ak.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ak.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.7MB
MD597922953ecfb1e38feceae49f5a1f4bf
SHA18080acd9863c61752b01af27671e459071aac66c
SHA256bc11e0801675911e2f36d8e61859762c1b7a2c9b3ce173cf65b3c37a3f9f5579
SHA5125a38fc28a137aac0028a002a5c42a31bccbbcb869762f8bf18dcdb5e4af447050bd3130c8880f37df188cc19307e1c0b9597870243307893637b9501f82c711b
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
Filesize
3.2MB
MD51e9f06ff572008ae0fe723c01a19f51f
SHA180623cbd7d7ad0cc539fcc42e0fa5a2f4a6d1193
SHA256d0a790d8c8fa9147b6fd6d5bf0ef3c2a8907ec17eeb384dcc9b2611044928802
SHA5127b9d4a9294b931e5efdc02a86336ee8daa4cad83e0c8aa49f148ae3040e819ea483837614a22f66c033d025b6e9106c0198caf1f51db8b3c261c16a024063d8a