Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
b52529e7ad752d0af04b3a81ba06744d.exe
Resource
win7-20240221-en
General
-
Target
b52529e7ad752d0af04b3a81ba06744d.exe
-
Size
877KB
-
MD5
b52529e7ad752d0af04b3a81ba06744d
-
SHA1
77665fa050f60881bc99a61a8ddaed86bfb4f284
-
SHA256
1092cc6954bd3aebee0053bf40b1fc06205ab3e35f2bce8c61e3c7f45f3ea355
-
SHA512
7c7cd5d2bfe9f17c2e477f4bb4b03f9af11c263a83bb7df1a2f9b4470b78ae4efbbb2e47502dae70fd4e4a2888566a9a130dc3739eada37ea51cd9f194ae6ec8
-
SSDEEP
24576:GoMLKmtvPyHu780y/4S1y9pNg4W7HMcKcN+2QHCUn:FiKmHyOWp7sc/Ql
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 1124 b52529e7ad752d0af04b3a81ba06744d.exe 1124 b52529e7ad752d0af04b3a81ba06744d.exe 1124 b52529e7ad752d0af04b3a81ba06744d.exe 1124 b52529e7ad752d0af04b3a81ba06744d.exe 1124 b52529e7ad752d0af04b3a81ba06744d.exe 1124 b52529e7ad752d0af04b3a81ba06744d.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b52529e7ad752d0af04b3a81ba06744d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3668 wrote to memory of 1372 3668 b52529e7ad752d0af04b3a81ba06744d.exe 88 PID 3668 wrote to memory of 1372 3668 b52529e7ad752d0af04b3a81ba06744d.exe 88 PID 3668 wrote to memory of 1372 3668 b52529e7ad752d0af04b3a81ba06744d.exe 88 PID 1372 wrote to memory of 1124 1372 b52529e7ad752d0af04b3a81ba06744d.exe 89 PID 1372 wrote to memory of 1124 1372 b52529e7ad752d0af04b3a81ba06744d.exe 89 PID 1372 wrote to memory of 1124 1372 b52529e7ad752d0af04b3a81ba06744d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b52529e7ad752d0af04b3a81ba06744d.exe"C:\Users\Admin\AppData\Local\Temp\b52529e7ad752d0af04b3a81ba06744d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\b52529e7ad752d0af04b3a81ba06744d.exe"C:\Users\Admin\AppData\Local\Temp\b52529e7ad752d0af04b3a81ba06744d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\b52529e7ad752d0af04b3a81ba06744d.exe"C:\Users\Admin\AppData\Local\Temp\b52529e7ad752d0af04b3a81ba06744d.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1124
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD55a61239f788562e02e92c68e7a93e4a2
SHA1c014bd9e2f1b6ff0242cb3eeca5d8b938f30756f
SHA25672dd0b9512e85d98664e28da81ed1b01f2dfe5d3b23adbf9decf064fbee5ee60
SHA5128c212ff5149725175aab696d37f683560ab4bdc63e8ca4692c407c7bb00fce5e38ecc23ae2f011b82efb23ad96362e3ac6f2b64ca9293c07baeb38b913a5d3df
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5ff4735adb8e65d066e4efc560a5ff909
SHA1cc8d24e32600999cf504ed4bfc00ad9fac6849c8
SHA25645d9807ae51be6491b34c6504eaa5932bac4ea4016256d53c44ff8fe69c225df
SHA51298a73166801abd9cce5161ef5100608cc6f4475bb2a12b9a07e969d48f6c0a075d3e96e65854bd5c3a27173efaee5a4eca6784ac3bd8d81dab3306cb14605534