Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
aa86e3b979005aef3d6ba087a699514b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa86e3b979005aef3d6ba087a699514b.exe
Resource
win10v2004-20240226-en
General
-
Target
aa86e3b979005aef3d6ba087a699514b.exe
-
Size
540KB
-
MD5
aa86e3b979005aef3d6ba087a699514b
-
SHA1
7b1915ef0d0b3caaaa0040f7b80541414caa0cc5
-
SHA256
5a7fea2951fc0d8182ad23d8f424e6f286ea77979a4e904321f165921d85d385
-
SHA512
f122728ddce70c6b0eb87c50ac55b9682994a45221614ff5f5f7fde551777dbf7102975d9645b5717bd5b7068e84fd46156a1b836232759a016799d45424af7e
-
SSDEEP
12288:bYoDL647vcNF5BBYCIcF9k0uJ+xVtPL4CscggpCgd:bZ3mk8kQxTP0CdgJG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2548 Webcard-Terra_imagem-001.exe -
Loads dropped DLL 2 IoCs
pid Process 2920 aa86e3b979005aef3d6ba087a699514b.exe 2920 aa86e3b979005aef3d6ba087a699514b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 DllHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2920 aa86e3b979005aef3d6ba087a699514b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2548 2920 aa86e3b979005aef3d6ba087a699514b.exe 28 PID 2920 wrote to memory of 2548 2920 aa86e3b979005aef3d6ba087a699514b.exe 28 PID 2920 wrote to memory of 2548 2920 aa86e3b979005aef3d6ba087a699514b.exe 28 PID 2920 wrote to memory of 2548 2920 aa86e3b979005aef3d6ba087a699514b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa86e3b979005aef3d6ba087a699514b.exe"C:\Users\Admin\AppData\Local\Temp\aa86e3b979005aef3d6ba087a699514b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Webcard-Terra_imagem-001.exe"C:\Users\Admin\AppData\Local\Temp\Webcard-Terra_imagem-001.exe"2⤵
- Executes dropped EXE
PID:2548
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD592e8aa1054837f2d749f7e552b45842d
SHA14f577ae8a3ea82cda87c93c662285f82523bbb96
SHA25649339ff047192d0577bb96fb4222e2bf5988a8b4cb0a63283e95afe1fca070b9
SHA51239940633d112925ee0d08ce07d4a57aa96027c7f4b0879802917af89d69a33072add9f13e901ede7c6b99447d868a52922b94dcedbb5d5007757112d546fa681
-
Filesize
383KB
MD57132a4993e8c8ccdefe7957054a74c18
SHA15bea59ab825a54b68806e2b7bf8a7a61c8ea1974
SHA25640fb5f45399875e85d253d6136aa1d39c349e98585b4a6896ecdbc775169d5f2
SHA5121421448f67b6570feed383298498e3f6dde65a6096a93b8f239a02ac43e01b35424b4fc572db879e242f495316fbc307dea37849568b5c9f8666e6bf0242afd6