Analysis
-
max time kernel
141s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 04:53
Behavioral task
behavioral1
Sample
a0fdba7889f0a625a9bb58a5e96b1563.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0fdba7889f0a625a9bb58a5e96b1563.exe
Resource
win10v2004-20240221-en
General
-
Target
a0fdba7889f0a625a9bb58a5e96b1563.exe
-
Size
169KB
-
MD5
a0fdba7889f0a625a9bb58a5e96b1563
-
SHA1
b428773d9159cee7377af73ca78c242337c4f4d5
-
SHA256
ef9776f1b55067b6a4739716db71d6812e6e9688f8b92dc9efb1c5245ccd85c2
-
SHA512
99e39c35f0512a1ffbdef1b66c23cecd878c52ab7d16044d54f26b3ac73455d1c09085b81a6fa984ecfb0598bf3c134c750f278580cccd5787511111ec657b42
-
SSDEEP
3072:F0slByWqU7sUUQjA3JCY8+eSO7t7HnJHUEhElu/jtTrYYGiL3JKMv3:FLlfqU7sUUZ3xTOfHUEOUjtXYYT3J
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4080 lsass.pif -
resource yara_rule behavioral2/memory/4316-0-0x0000000000400000-0x00000000007C2000-memory.dmp upx behavioral2/files/0x0006000000023241-7.dat upx behavioral2/memory/4080-10-0x0000000000400000-0x00000000007C2000-memory.dmp upx behavioral2/memory/4316-13-0x0000000000400000-0x00000000007C2000-memory.dmp upx behavioral2/memory/4080-14-0x0000000000400000-0x00000000007C2000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\lsass.pif a0fdba7889f0a625a9bb58a5e96b1563.exe File opened for modification C:\Windows\lsass.pif a0fdba7889f0a625a9bb58a5e96b1563.exe File opened for modification C:\Windows\lsass.jpg lsass.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4316 a0fdba7889f0a625a9bb58a5e96b1563.exe 4080 lsass.pif -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4080 4316 a0fdba7889f0a625a9bb58a5e96b1563.exe 86 PID 4316 wrote to memory of 4080 4316 a0fdba7889f0a625a9bb58a5e96b1563.exe 86 PID 4316 wrote to memory of 4080 4316 a0fdba7889f0a625a9bb58a5e96b1563.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0fdba7889f0a625a9bb58a5e96b1563.exe"C:\Users\Admin\AppData\Local\Temp\a0fdba7889f0a625a9bb58a5e96b1563.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\lsass.pifC:\Windows\lsass.pif2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5a0fdba7889f0a625a9bb58a5e96b1563
SHA1b428773d9159cee7377af73ca78c242337c4f4d5
SHA256ef9776f1b55067b6a4739716db71d6812e6e9688f8b92dc9efb1c5245ccd85c2
SHA51299e39c35f0512a1ffbdef1b66c23cecd878c52ab7d16044d54f26b3ac73455d1c09085b81a6fa984ecfb0598bf3c134c750f278580cccd5787511111ec657b42