Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 22:48
Static task
static1
Behavioral task
behavioral1
Sample
c9d26841ee6834690fe0fbc0a81e3321.exe
Resource
win7-20240220-en
General
-
Target
c9d26841ee6834690fe0fbc0a81e3321.exe
-
Size
877KB
-
MD5
c9d26841ee6834690fe0fbc0a81e3321
-
SHA1
909908586f27cc858389f3e986587dda8970e90d
-
SHA256
105e757851fd3593e32ea89b2f4b015e13f3bbd915bf352ccf401dea9c65f3f9
-
SHA512
585023afd24cd0f1041f77557df3d1e77defb49cfc1402be2a64efee9fd6bace7a0d2c4f4e882d8617a767143a81257b69f21d6b49d2c80d4163b00f8e2f1522
-
SSDEEP
24576:GoMLKmtvPyHu780y/4S1y9pNg4W7HMcKcN+2QHCUm:FiKmHyOWp7sc/Qk
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2600 c9d26841ee6834690fe0fbc0a81e3321.exe 2600 c9d26841ee6834690fe0fbc0a81e3321.exe 2600 c9d26841ee6834690fe0fbc0a81e3321.exe 2600 c9d26841ee6834690fe0fbc0a81e3321.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c9d26841ee6834690fe0fbc0a81e3321.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1908 1992 c9d26841ee6834690fe0fbc0a81e3321.exe 28 PID 1992 wrote to memory of 1908 1992 c9d26841ee6834690fe0fbc0a81e3321.exe 28 PID 1992 wrote to memory of 1908 1992 c9d26841ee6834690fe0fbc0a81e3321.exe 28 PID 1992 wrote to memory of 1908 1992 c9d26841ee6834690fe0fbc0a81e3321.exe 28 PID 1992 wrote to memory of 1908 1992 c9d26841ee6834690fe0fbc0a81e3321.exe 28 PID 1992 wrote to memory of 1908 1992 c9d26841ee6834690fe0fbc0a81e3321.exe 28 PID 1992 wrote to memory of 1908 1992 c9d26841ee6834690fe0fbc0a81e3321.exe 28 PID 1908 wrote to memory of 2600 1908 c9d26841ee6834690fe0fbc0a81e3321.exe 29 PID 1908 wrote to memory of 2600 1908 c9d26841ee6834690fe0fbc0a81e3321.exe 29 PID 1908 wrote to memory of 2600 1908 c9d26841ee6834690fe0fbc0a81e3321.exe 29 PID 1908 wrote to memory of 2600 1908 c9d26841ee6834690fe0fbc0a81e3321.exe 29 PID 1908 wrote to memory of 2600 1908 c9d26841ee6834690fe0fbc0a81e3321.exe 29 PID 1908 wrote to memory of 2600 1908 c9d26841ee6834690fe0fbc0a81e3321.exe 29 PID 1908 wrote to memory of 2600 1908 c9d26841ee6834690fe0fbc0a81e3321.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9d26841ee6834690fe0fbc0a81e3321.exe"C:\Users\Admin\AppData\Local\Temp\c9d26841ee6834690fe0fbc0a81e3321.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\c9d26841ee6834690fe0fbc0a81e3321.exe"C:\Users\Admin\AppData\Local\Temp\c9d26841ee6834690fe0fbc0a81e3321.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\c9d26841ee6834690fe0fbc0a81e3321.exe"C:\Users\Admin\AppData\Local\Temp\c9d26841ee6834690fe0fbc0a81e3321.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD55a61239f788562e02e92c68e7a93e4a2
SHA1c014bd9e2f1b6ff0242cb3eeca5d8b938f30756f
SHA25672dd0b9512e85d98664e28da81ed1b01f2dfe5d3b23adbf9decf064fbee5ee60
SHA5128c212ff5149725175aab696d37f683560ab4bdc63e8ca4692c407c7bb00fce5e38ecc23ae2f011b82efb23ad96362e3ac6f2b64ca9293c07baeb38b913a5d3df
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5ff4735adb8e65d066e4efc560a5ff909
SHA1cc8d24e32600999cf504ed4bfc00ad9fac6849c8
SHA25645d9807ae51be6491b34c6504eaa5932bac4ea4016256d53c44ff8fe69c225df
SHA51298a73166801abd9cce5161ef5100608cc6f4475bb2a12b9a07e969d48f6c0a075d3e96e65854bd5c3a27173efaee5a4eca6784ac3bd8d81dab3306cb14605534