Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-03-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe
Resource
win10v2004-20231215-en
General
-
Target
19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe
-
Size
7.3MB
-
MD5
888284957e75b8b7db670ce4711ba2dd
-
SHA1
032c11005496fb72208409dcc39d14949ce2f908
-
SHA256
19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb
-
SHA512
596156aca8449664ced425cf86600fbc747730d2544ef217bc4e9b6dd407033c1579cf05b5c5beafa8622b86eebf63dc2abdc16a14d86256308120aaa48fb6ef
-
SSDEEP
196608:zLkqSpYCYzubVwvtK/D0P+7Zi2aAhHEmkGmmlyv:mYtU4OgP+IATjmoyv
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2144 autorun.exe -
Loads dropped DLL 2 IoCs
pid Process 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 2144 autorun.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2144 autorun.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 2144 autorun.exe 2144 autorun.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2144 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 28 PID 2204 wrote to memory of 2144 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 28 PID 2204 wrote to memory of 2144 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 28 PID 2204 wrote to memory of 2144 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 28 PID 2204 wrote to memory of 2144 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 28 PID 2204 wrote to memory of 2144 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 28 PID 2204 wrote to memory of 2144 2204 19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe"C:\Users\Admin\AppData\Local\Temp\19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe"C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\19b95a73de4838af73256397e9468ceee9947b5e1f3fc088995a0cb9a633d0bb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5967fdfe0a01c083804673b4976ad6730
SHA15d05ade6dd0d1d67ea7879cd8f7779ef53abbd4c
SHA25672eda9d49bcd0cd3b540f75c4215714378afbb1ce40afcbb7a0b246ab2a44f21
SHA51250acacf15fa4cfa8319f789fb534cdb4a8d559ceb3e5e832b32015ff2fbee2c3902abfc83bc2493d57298ed32d0aeb6817e077758c4c2c956432b1d3f3c738d4
-
Filesize
386KB
MD5bfb0add91733214d2412ffe7ab436046
SHA1c937db6796933e3fecee6d99eece9462a074eda9
SHA256e4b0ffe09d0df0fc3bf93777610546cdc9ff6eb528bf1edbbb3d3edc5e965627
SHA5121fe8660d4a3ea51f742ea2ec212e21b34fb0b68de3428d661798f4fcb06d5f8aca0cdd6f447a7878b915cef7b6520724b4125322a219c5d4b154bfb28c1a81cb
-
Filesize
473KB
MD56fff38d7b9c42c22193f1fab22452abf
SHA14f70831adafd58eff89fdbc9801351115ee4ab00
SHA256478f98f85b515931ece964bf03027ebdd00615f3fa12be75f7daa4ce50242e5a
SHA512569a6b562172574e48f94cb9755512c82963ac5cf1601e50437c658072684ccb4936be243d07805b66576ecbdcae879ba3fb9138460a9b7c311d3663caa70a99
-
Filesize
1KB
MD53d9ecabffb8558560941f1b3172c3c38
SHA1433a85b775c815dfeb16e2761cf623aa794299ee
SHA256b38a3b25527a64744df7b3d17a93a77bb251e778c1e5fde37e6f894820197e7e
SHA512326b5687f98632f2bbeb29ddb0eebe7fc8d43b2f6caed00df30b14feb7d1875199ded7cf27ac704145d78e67fe7efcef7df1e29b59f28e8dac9ecf76433feb43
-
Filesize
318KB
MD52e34ae97aeff9034f66d04e6c2bf987f
SHA1a362799075fe1e8c6afa77f8ca831bd5787073df
SHA25645bd2e6cbd5b8dfea5f471a4e179b01c4cb764afcf2493e86494272be8dd9342
SHA512194df497d750903537bdc76b0527bb75e3091154dce32f1eccfc855d0019665ca08fe49848380335325417e5b9b53265fa3c6c226900c68f0e8fd92be5f15591
-
Filesize
6.5MB
MD5008a95ddb966d162294fabdf8170b7c6
SHA1957b076184c504213fa5b535a15392c38ac94687
SHA2567181a8eb305ce67bb028330724b6f4c0715b4e4aab75b2a6d1765d52d827498e
SHA512c9491b7c39d3c9ae686864389098225389da416eb1426c2736408419ceedecec1b91f097afa933802996287c4d505a19be625858758d59c244435172cb4ef82b