Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe
Resource
win10v2004-20240226-en
General
-
Target
5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe
-
Size
396KB
-
MD5
f90418677ecd420bf89250078ec5772a
-
SHA1
7fbb1953729a71ea1e18b95b92bf741052d17235
-
SHA256
5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819
-
SHA512
97a70e6743e73fc21ca62cad35ba36cfecead7f26487ce88f0c034a4c68e7ae569663613df9e392958c27ce90fa92fb9b8776c58837741dfcaebe9505c2690fe
-
SSDEEP
12288:4jauDReW5jS784dExYwW9ID0UggQM6nNGG:4DDFS784dKJDgF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1208 cwdgi.exe -
Loads dropped DLL 2 IoCs
pid Process 1964 5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe 1964 5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\cwdgi.exe" cwdgi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1208 1964 5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe 28 PID 1964 wrote to memory of 1208 1964 5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe 28 PID 1964 wrote to memory of 1208 1964 5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe 28 PID 1964 wrote to memory of 1208 1964 5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe"C:\Users\Admin\AppData\Local\Temp\5a1e292b2e1f06a266d678dc85c3c6488f4683010835fb730f9275b8e9506819.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\ProgramData\cwdgi.exe"C:\ProgramData\cwdgi.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53939fbbb064ea739e1db18ad4a23b12f
SHA1d1ef6e7a1294b3d7c96ab5f649ae8c030840eeb4
SHA25659aaba838d6c883b48df61fc913d85cb41a04760ea96f82432913968179c19c8
SHA512964065e03192bf44d3b6c8c4c77f15a8c6b416a0e633fe13b0ad214c9916842b567791ed824d7ee0462a2c5dccf581a37a67f08d85c2c5e77de16b7c4615c173
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
259KB
MD5322b4b9ac8686d2fe0ca8059f36f1b4d
SHA11c4f68b483862978a7d6c338ab60b8372c747a96
SHA256a256a1fab20c4b2d5aa109a933e0785a864b01b24f413cbbffd9083e5b24cf86
SHA512151ce52b3c9465126a6548fae86057981f2da12160db7d5d31080d4e4f9314cb4ef66eccb727f915a263ff1782d6308f61c3ddb4f61722d15879c71d4f88ef6c