Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
c8af93395670a0888d6adb9b17db78eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8af93395670a0888d6adb9b17db78eb.exe
Resource
win10v2004-20240226-en
General
-
Target
c8af93395670a0888d6adb9b17db78eb.exe
-
Size
7.4MB
-
MD5
c8af93395670a0888d6adb9b17db78eb
-
SHA1
999998a98931e8b5ab89ccb40a2e242402b04883
-
SHA256
29b15e8d7d728c48f7da14ec6d689f5994654e24194ad4b9d8cdf9bd6874fd7c
-
SHA512
cc02a094d6542ba481a398832558bb9ee70aee0526adaa356e73b25ea5ce31449c88b4fad1ddbf640db72185da3cf7eebe1f1d9a3580c00482d5df688f537c1b
-
SSDEEP
196608:L8Pe5j/ITFFTqG/db3yLdX8GQ/yOe3KlUrsHS90eq1L:Lge5j/MB7yuArOeq1L
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 3068 c8af93395670a0888d6adb9b17db78eb.exe 3068 c8af93395670a0888d6adb9b17db78eb.exe 3068 c8af93395670a0888d6adb9b17db78eb.exe 3068 c8af93395670a0888d6adb9b17db78eb.exe 3068 c8af93395670a0888d6adb9b17db78eb.exe 3068 c8af93395670a0888d6adb9b17db78eb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\09\01\Intel32\isp5E3B.tmp\temp.000 c8af93395670a0888d6adb9b17db78eb.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\09\01\Intel32\isp5E3B.tmp\iGdi.dll c8af93395670a0888d6adb9b17db78eb.exe File created C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\09\01\Intel32\iKe68C9.tmp c8af93395670a0888d6adb9b17db78eb.exe File opened for modification C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\09\01\Intel32\iKe68C9.tmp c8af93395670a0888d6adb9b17db78eb.exe File created C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\09\01\Intel32\set5DAD.tmp c8af93395670a0888d6adb9b17db78eb.exe File created C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\09\01\Intel32\isp5DAC.tmp\temp.000 c8af93395670a0888d6adb9b17db78eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3068 c8af93395670a0888d6adb9b17db78eb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2208 wrote to memory of 3068 2208 c8af93395670a0888d6adb9b17db78eb.exe 28 PID 2208 wrote to memory of 3068 2208 c8af93395670a0888d6adb9b17db78eb.exe 28 PID 2208 wrote to memory of 3068 2208 c8af93395670a0888d6adb9b17db78eb.exe 28 PID 2208 wrote to memory of 3068 2208 c8af93395670a0888d6adb9b17db78eb.exe 28 PID 2208 wrote to memory of 3068 2208 c8af93395670a0888d6adb9b17db78eb.exe 28 PID 2208 wrote to memory of 3068 2208 c8af93395670a0888d6adb9b17db78eb.exe 28 PID 2208 wrote to memory of 3068 2208 c8af93395670a0888d6adb9b17db78eb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8af93395670a0888d6adb9b17db78eb.exe"C:\Users\Admin\AppData\Local\Temp\c8af93395670a0888d6adb9b17db78eb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\c8af93395670a0888d6adb9b17db78eb.exe-deleter2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\InstallShield\Professional\RunTime\09\01\Intel32\isp5E3B.tmp\IGdi.dll
Filesize184KB
MD5298c79ac2f609736788cc7cacdeeef32
SHA11cce1dcc23a941e650edfeaa7de59327fa452ba2
SHA25663671696aa87c0862e6381bc759116cd377c5331ab50ae6d05ba7cd29cf02580
SHA51229fc496780a4fdac6a8c4af6b737973019e3087b5d3d8fe8625d4ce1de88e437eea0254d8900934846c6519ce0bffbcddfe1aa01cf5736b47dba58f06071fe23
-
Filesize
304KB
MD5369ecaca6c59265f47d234da8faab871
SHA1162bf1cb2d201766e4f0fa52dbeddd603eca9a21
SHA256ad010c642f2bb264c69c153dcde78daa0bbf4699155f22e16641bba82158e7b1
SHA5123430ccc7c78633c860c29778a0b854d5acf52b65283e88f18cad51796ece59cee1b2b040ffebd50a6ea52d2ce88836a06c136b92d7efc97e75ce8989d7571392
-
Filesize
425KB
MD50fcd29b249c145bab33f24c8341dd0a3
SHA1375d97a6c23974da0f73db806533bc3205676ec0
SHA2568af43e8f489b166177d6820783f55d32911baed67378e5542ee0a3e3c51ec4bc
SHA51257c5c61be9c2105dcc6da9830b527cb0acd83f04faab418df603874a3b682cd33148b3092ad8eb0b9ca91aa011278a5576aac62aa4074ebb4759928892091e55
-
Filesize
495B
MD5c1a2b47832c41e3013a63aa095e889af
SHA1c84d9af84dc6c51be85d9446f5b23d4605e8379e
SHA256ea2f29dcb221ed23ee155e3336d01c71630dcac983208a90bf6cbfc19dc68515
SHA512bf02456c66af34808d5f3607ed57707b524ebcaac92ae91cd73c70ea5243f694c4eb7aedf5b1cf5a890d7d9cf5ef717f3d52645c22a3699985389b5b23f00efe
-
Filesize
16KB
MD5ad4695c916e1610ced05e6c9a34f45d2
SHA1e0053ffa31732e131b4a3d81204d93b953443785
SHA256d12f20294bfae4b572b71cbbb2f6d553b21982c90495fbf69833556b1790d949
SHA512ff44b05c6bb53ae34431e6623a2c2e52d85984b33c7650269b35317822b860c9a38ba0a0f2154396b81811dabae9d2b3d32669ce87c7e87695e3633292a06eea
-
Filesize
712KB
MD51ea0c41b4f2f0e807700f9a72d99ac05
SHA165c693fd17be74d1c8dfeadd591f3c3408ae321c
SHA256cb29c9091d22a94e1aa72a6f2a83e01013e5148d8dcfba8c90d2cdbd6d9b6e48
SHA5123f4e80bd8d3808fb76acef835c70cc00503acf38f13d3cec54bbf9cf87343a4c1d148a146fa432ca884eaf3c327e199c17432c91f6d6424fb3c17890255feda3
-
Filesize
360KB
MD532fa757c64fb62f07f3205016656a0a7
SHA178c7d2f00878e2efa591a6e3ac80edab8242473b
SHA256ff6944c00f11ab10cc9bcbfe4f6f0cbab088b52448904282a695eea56787d82a
SHA512d87aef916ce072f16b6ca5978a424f2dc648d880241651019e6f21377834fdbba8dd424b002db373888840b358e13122c87e3db51a7bde6cdb1509fe74ac647a