Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
cDA34i7Jn.exe
Resource
win7-20240221-en
General
-
Target
cDA34i7Jn.exe
-
Size
1.2MB
-
MD5
0eda40dd8540130f4cad3522ee287d6d
-
SHA1
ebf18090cc0e4bb1cca228822c76d87aea719549
-
SHA256
8fcf2f04f8650515ec14d7b5db140084710d7cad0f3faa5b64c39fe6f2d3b166
-
SHA512
3959ddedabfb457c7ab0bad5e317f5b3b2e10283cb478bbae02ac90ef29d4c8806f8c6f1b4d4953324e41a13affdfbf0b51a2ea52795fe6db426af555ca27b23
-
SSDEEP
24576:gu8JzEgZUknnNzB43bz/3FDhMVGYkUmdNJhmtnjyFwTACQnMs62Xx4:V8JqFVMEtHahQnu
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cDA34i7Jn.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 cDA34i7Jn.exe 2744 cDA34i7Jn.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2616 2744 cDA34i7Jn.exe 28 PID 2744 wrote to memory of 2616 2744 cDA34i7Jn.exe 28 PID 2744 wrote to memory of 2616 2744 cDA34i7Jn.exe 28 PID 2744 wrote to memory of 2616 2744 cDA34i7Jn.exe 28 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cDA34i7Jn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cDA34i7Jn.exe"C:\Users\Admin\AppData\Local\Temp\cDA34i7Jn.exe"1⤵
- UAC bypass
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c echo.>c:\xxxx.ini2⤵PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD505a6b5e6f8f3c239a9669dcc693e9b83
SHA1194ff18e37d56b8d988cd60bb9f0e94bbb23e767
SHA2561bfa036a09bad94fc4b9ce956c13628987f4e390a5f88d64a47f44941aa31692
SHA5120464644346aecc20a35c0ede49bd8e4484314941894553ed728f12c1005b5a01a222b18af396da9675c8183bf8935765ea59a03cacbeb71138270998f9f4c7cb