Analysis
-
max time kernel
49s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
a178083977255560a5e3b886e4f79ce7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a178083977255560a5e3b886e4f79ce7.exe
Resource
win10v2004-20240221-en
General
-
Target
a178083977255560a5e3b886e4f79ce7.exe
-
Size
2.0MB
-
MD5
a178083977255560a5e3b886e4f79ce7
-
SHA1
9c59fec6a7d2559db0566ef5adc93740dcc67bad
-
SHA256
9da45c1414fde84e01fbe21e66ab691b1201aaa24c72f8575f5dec3f0fbd23b8
-
SHA512
1136f7e5bd5f062fe1249db4d8bddab33f848bb3c901bcde1cdf33f0f7761f104156e5799c64b4e65cf2235d404b1114a246faac5a811b992b222387f80942af
-
SSDEEP
49152:Dtq2uoGFcKkmE7BRCp4u3e3S5y1Shi35U0thsf:Dduo4cKkmISZe371SgJB4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2604 o4ib9o461wv8827.exe 2628 4epu7913jyq24zg.exe -
Loads dropped DLL 3 IoCs
pid Process 1936 a178083977255560a5e3b886e4f79ce7.exe 2604 o4ib9o461wv8827.exe 2604 o4ib9o461wv8827.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2628 4epu7913jyq24zg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 4epu7913jyq24zg.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2604 1936 a178083977255560a5e3b886e4f79ce7.exe 2 PID 1936 wrote to memory of 2604 1936 a178083977255560a5e3b886e4f79ce7.exe 2 PID 1936 wrote to memory of 2604 1936 a178083977255560a5e3b886e4f79ce7.exe 2 PID 1936 wrote to memory of 2604 1936 a178083977255560a5e3b886e4f79ce7.exe 2 PID 1936 wrote to memory of 2604 1936 a178083977255560a5e3b886e4f79ce7.exe 2 PID 1936 wrote to memory of 2604 1936 a178083977255560a5e3b886e4f79ce7.exe 2 PID 1936 wrote to memory of 2604 1936 a178083977255560a5e3b886e4f79ce7.exe 2 PID 2604 wrote to memory of 2628 2604 o4ib9o461wv8827.exe 1 PID 2604 wrote to memory of 2628 2604 o4ib9o461wv8827.exe 1 PID 2604 wrote to memory of 2628 2604 o4ib9o461wv8827.exe 1 PID 2604 wrote to memory of 2628 2604 o4ib9o461wv8827.exe 1 PID 2604 wrote to memory of 2628 2604 o4ib9o461wv8827.exe 1 PID 2604 wrote to memory of 2628 2604 o4ib9o461wv8827.exe 1 PID 2604 wrote to memory of 2628 2604 o4ib9o461wv8827.exe 1
Processes
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\4epu7913jyq24zg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\4epu7913jyq24zg.exe"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2628
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\o4ib9o461wv8827.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\o4ib9o461wv8827.exe" -e -p7yit6hq0c534ln61⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2604
-
C:\Users\Admin\AppData\Local\Temp\a178083977255560a5e3b886e4f79ce7.exe"C:\Users\Admin\AppData\Local\Temp\a178083977255560a5e3b886e4f79ce7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD58c03b4dc54244014229009d42e7c0455
SHA18df39a19d4601daf554143815b6afa3286904a7d
SHA256012a675100f650f93436b0c226652b335db207b9ba04331d9d0513c975bb9010
SHA512bbd9573f14411dd23689e103e2ba75bfc89b481e540450ba47fd1550b088177efedd5918713ebab9776b89a57a82f28ba9784785fcc22fc86e180aeb70724d08
-
Filesize
1.9MB
MD5bfd99e635288e5e0f46f0e7aa150300c
SHA117b31bc6d8a5ca2c065fbaf3e1c755cf68ffd37b
SHA256969006837a0889f09181454819b7a27d89ca11330b628d3faf56a3e46022fd01
SHA512c806add828107536f463d3103be1907ddbe653a25fbf0e785dc69c2e9a52b76927a2d3efa6d509b85b97fa9710a3156273ee5c914f3365c5e854c6073da704cc