Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
c36a3576f7812c5c39557d32584e0fa1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c36a3576f7812c5c39557d32584e0fa1.exe
Resource
win10v2004-20240226-en
General
-
Target
c36a3576f7812c5c39557d32584e0fa1.exe
-
Size
104KB
-
MD5
c36a3576f7812c5c39557d32584e0fa1
-
SHA1
d215bc0e873295582d9450ce7ede7b3bf09b1fb1
-
SHA256
2be78e7b0782d26d73f18144941d9750ab0dbabf9cdb70d93a9513838530f7be
-
SHA512
3d73e26cba11cf560d5969c02f49fd3d4d59589c2e3ead2950d1a2fc52010aa18d9335d7c487e707e9f2030ea4746a2eaa6794ef58c670a108b410d466ab43b8
-
SSDEEP
3072:puzIQ6qjdD8Kys1M1VF45bE4GXekout1:qp6qjdD8o1qzyEh1oS
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2592 rundll32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Wizet\Maple\npkcrypt.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2592 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2592 1712 c36a3576f7812c5c39557d32584e0fa1.exe 28 PID 1712 wrote to memory of 2592 1712 c36a3576f7812c5c39557d32584e0fa1.exe 28 PID 1712 wrote to memory of 2592 1712 c36a3576f7812c5c39557d32584e0fa1.exe 28 PID 1712 wrote to memory of 2592 1712 c36a3576f7812c5c39557d32584e0fa1.exe 28 PID 1712 wrote to memory of 2592 1712 c36a3576f7812c5c39557d32584e0fa1.exe 28 PID 1712 wrote to memory of 2592 1712 c36a3576f7812c5c39557d32584e0fa1.exe 28 PID 1712 wrote to memory of 2592 1712 c36a3576f7812c5c39557d32584e0fa1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c36a3576f7812c5c39557d32584e0fa1.exe"C:\Users\Admin\AppData\Local\Temp\c36a3576f7812c5c39557d32584e0fa1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\Favorites\hfdf.hlp" InstallHook12⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5984784de8a6bf33ec09bc361b98577a4
SHA1de1d917ddab4cb1ce935337592a46d08cd222bb3
SHA256a2e58cf7588883540380403ef473af5e93163e3391e421a3f1e571f302c80b24
SHA512635afdff5dc8cb987f1ad2a573620b317a5279c89d0015a5c37a8bf518e1382ebaeb0cb03fa440f80750b172da2ec2f23855e8747cadde062027f514579ee817