Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe
Resource
win10v2004-20240226-en
General
-
Target
036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe
-
Size
299KB
-
MD5
9f713c935acbd5ab63362efe61e622ad
-
SHA1
e36778b3d00ef6445922377e9a256aafe7fcd073
-
SHA256
036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9
-
SHA512
c7b6ce191251647911157f7ba1292b813e30850997752d5d3a12f989afc8280dcd8d56a44b865f6fdb653cc91b1af8b5121fe25022207be60b2f77341f98e1af
-
SSDEEP
6144:Orka9uEo2S1YnQmCX492DkwNP3qpYF1aZpbdnMne3SLFjpjhGdO503+rhcLS:OrkCu6/eIo4Zf5nMmOjVG+US
Malware Config
Signatures
-
Detects executables referencing many IR and analysis tools 1 IoCs
resource yara_rule behavioral1/files/0x0009000000015c52-19.dat INDICATOR_SUSPICIOUS_References_SecTools -
Loads dropped DLL 3 IoCs
pid Process 2804 036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe 2804 036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe 2804 036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2804 036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe"C:\Users\Admin\AppData\Local\Temp\036b4f505edd828838268927adc7251d62d4415f388dd894d7501fd1263bbbd9.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524B
MD591f6c1b0eb4eb31c6db8597e3e24f237
SHA1a8540996a3c374efe2c57017bc98e657d625f06e
SHA2565b4f976deef13d2c400d0aec8e806b8e3feac9d72509f7c97b975525124b4db3
SHA51214c33059ea6b5e4fb52724441b9772ddcc7d2565a7ab287bca1908a28833bf4acaf3243363a2283d485e87e70e7a385b8967b459674f27bb9e7a430b5d062ff9
-
Filesize
2KB
MD5de2fa3f89b61bd3a3537c56bd00f3b22
SHA11fd91a11e6e9046ee385d3a87d9468f3cfafdc14
SHA2566ec08c1ba7302e4f0e9e8fa246fdf827fa555306dfcca09e803d0c5cc7914a54
SHA5127227fa7bf84fc09e34404dc34cecf9e728370d18db43e7622fc311f3d41cb235ba24a28ca1e5285c5e3ed6a1fa925d0352b11984d0b1df7a0dd2e11191dee766
-
Filesize
15KB
MD5e717f6ce3a7429bfa6d7f3cf66737a4b
SHA101f4042589b4ed88c351ffeac256be7a9d884818
SHA2567be720a73ba8b084702c89f64a9b295fad92545d6ba781072cc056823f9a7633
SHA51265a9a27430811aa01b55cf365f8b7b9f03e70d32ec60e0706242bc568242bcd493999dc1b02d92bf0d01c0095c8c38d30f282a998cafb80e60ad07e0d875ce80
-
Filesize
4KB
MD5c3926cef276c0940dadbc8142153cec9
SHA1f8b350d2b7158f5ab147938961439860d77b9cb4
SHA2560ec48e3c1886bc0169a4bc262f012e9b7914e3b440bb0ecc4d8123924abc9b93
SHA5125b9958095b8a7b39b3a2226a5242faec8d2d799d10e1e4ed6dbfb8aaebe51b7496cf4bb5ad588366a296671df3ba46a3f42860abc7f9501b4cc5efd55dd87904
-
Filesize
269KB
MD5af7ce801c8471c5cd19b366333c153c4
SHA14267749d020a362edbd25434ad65f98b073581f1
SHA256cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA51288655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c
-
Filesize
70KB
MD5cf8871d9353de6ec6885450d470c6e62
SHA10478926e48a4f76b365cc3d1877e2408f00415d4
SHA256d5dcd241fcad38b8bfbd7a32ec85c71cf96b8a9671d96eb988264b00bfc2b373
SHA51209d1356582188f6df358607af261afb5faa5e9055b1c84de8782109fb1db82320f739edeab751674a3bd8da758b1188ad212dc1d6d8b14a23a4edc48c3e1cf2c
-
Filesize
160KB
MD53d99f53c75ee301fd7bc5abe8d883dbb
SHA135264d2ed3c675f152ac54045ce817693234fe06
SHA2564ba7a5ffcfa4409eca57e201bedf9357d59a28bfd08b23081eb48f93ed8abea0
SHA512a58054619c56b4dc1653876050a0b67df9bcffcf078b62f8cd88b96511a370e3ae9c67effc36d0b152eb5429f60eba52e5e58afca85a58527a3bf3600a89a42f