Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
bfddcea5454a7997305696541e6d6347.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfddcea5454a7997305696541e6d6347.exe
Resource
win10v2004-20240226-en
General
-
Target
bfddcea5454a7997305696541e6d6347.exe
-
Size
286KB
-
MD5
bfddcea5454a7997305696541e6d6347
-
SHA1
2885d22411b1a0f5565e0542bb38c0a3cf7a0e4d
-
SHA256
6f6f647a9bafb8dfd42593d4d77abdd05947bc6a49716b79fbbc1a51f293079d
-
SHA512
2a404382475c49f150a30eb283811002da5ba848988d8c139a653f72b2bdb41878b32c885c6a5dcef6e0c9e36ed98d6edd7f5c6b6efbcd4fc7f79a2bf1b6a205
-
SSDEEP
6144:23MrONR1cNwPLvoqg0R2VhPefm0ToyugupkXHykED/m0eNGGs:o171c2obY7WDK3yh/n
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2812 agetlksyiey.exe -
Loads dropped DLL 2 IoCs
pid Process 2164 bfddcea5454a7997305696541e6d6347.exe 2164 bfddcea5454a7997305696541e6d6347.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib bfddcea5454a7997305696541e6d6347.exe File created C:\Windows\SysWOW64\psapi.lib bfddcea5454a7997305696541e6d6347.exe File created C:\Windows\SysWOW64\agetlksyiey.exe bfddcea5454a7997305696541e6d6347.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe bfddcea5454a7997305696541e6d6347.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2164 bfddcea5454a7997305696541e6d6347.exe 2164 bfddcea5454a7997305696541e6d6347.exe 2812 agetlksyiey.exe 2812 agetlksyiey.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2812 2164 bfddcea5454a7997305696541e6d6347.exe 28 PID 2164 wrote to memory of 2812 2164 bfddcea5454a7997305696541e6d6347.exe 28 PID 2164 wrote to memory of 2812 2164 bfddcea5454a7997305696541e6d6347.exe 28 PID 2164 wrote to memory of 2812 2164 bfddcea5454a7997305696541e6d6347.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfddcea5454a7997305696541e6d6347.exe"C:\Users\Admin\AppData\Local\Temp\bfddcea5454a7997305696541e6d6347.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5bfddcea5454a7997305696541e6d6347
SHA12885d22411b1a0f5565e0542bb38c0a3cf7a0e4d
SHA2566f6f647a9bafb8dfd42593d4d77abdd05947bc6a49716b79fbbc1a51f293079d
SHA5122a404382475c49f150a30eb283811002da5ba848988d8c139a653f72b2bdb41878b32c885c6a5dcef6e0c9e36ed98d6edd7f5c6b6efbcd4fc7f79a2bf1b6a205
-
Filesize
19KB
MD5a5b1b1f7c2c51ff400d93ae63f484d96
SHA15f038003bf8851254ba577db5d8dfd69c1085c33
SHA25635b1d2d2bc5c531d49aa3550de5c19bd5f4ebe79c594c6f5000d6de28b2621bf
SHA51290c2145b39611bd1406c513dff16366a51e86e8831c34ab15f650e6620a75533e800db056dda2e7e176fac8b20cd0be76bc1725b45930b31595d4aac00da4eec