Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 09:29
Behavioral task
behavioral1
Sample
cdb34600aa9741d3966a24b39fbe75bb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cdb34600aa9741d3966a24b39fbe75bb.exe
Resource
win10v2004-20240226-en
General
-
Target
cdb34600aa9741d3966a24b39fbe75bb.exe
-
Size
980KB
-
MD5
cdb34600aa9741d3966a24b39fbe75bb
-
SHA1
4838f81ca17c5bb2e44e14b55b17f37c102dfdc0
-
SHA256
b1dc94657393b66d837e9fe510a20f573a7529ee88be87d94531befabe4ef078
-
SHA512
6f5b3be9c84b4b2b4045f5cd948ed34917b0f83716d8cabd6ab97ebb64f084101338c0112e23dd999bbc46ea6663b9b24e35c8760b73d8f68ade98a9a1513b21
-
SSDEEP
12288:OeuKz5I1qHhwlWoflw5Dze6WBWtmqYk4M0:tnVI1qBwl9fIzO+mqY3M0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3364 ~027653.exe 4568 ~027653.exe -
resource yara_rule behavioral2/memory/3600-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/3600-30-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3364 set thread context of 4568 3364 ~027653.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3600 cdb34600aa9741d3966a24b39fbe75bb.exe 3364 ~027653.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3600 wrote to memory of 3364 3600 cdb34600aa9741d3966a24b39fbe75bb.exe 89 PID 3600 wrote to memory of 3364 3600 cdb34600aa9741d3966a24b39fbe75bb.exe 89 PID 3600 wrote to memory of 3364 3600 cdb34600aa9741d3966a24b39fbe75bb.exe 89 PID 3364 wrote to memory of 4568 3364 ~027653.exe 90 PID 3364 wrote to memory of 4568 3364 ~027653.exe 90 PID 3364 wrote to memory of 4568 3364 ~027653.exe 90 PID 3364 wrote to memory of 4568 3364 ~027653.exe 90 PID 3364 wrote to memory of 4568 3364 ~027653.exe 90 PID 3364 wrote to memory of 4568 3364 ~027653.exe 90 PID 3364 wrote to memory of 4568 3364 ~027653.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdb34600aa9741d3966a24b39fbe75bb.exe"C:\Users\Admin\AppData\Local\Temp\cdb34600aa9741d3966a24b39fbe75bb.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\~027653.exeC:\Users\Admin\AppData\Local\Temp\~027653.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\~027653.exeC:\Users\Admin\AppData\Local\Temp\~027653.exe3⤵
- Executes dropped EXE
PID:4568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
969KB
MD51129618eb1a3422d5beda6439f4c30f1
SHA1fa0627cd250d62431b2a732da71615dec1b7464a
SHA256098496e5553af91b5ba1de8b835d426fa19ba3b6bfeb2f90f9a91fd28a6145ca
SHA51237a2cf100520b39530e6f2a112c0678ec336d86078f65bcc96b779ce5fad1ca7cacddeb912cf61c1beccaa73888dc08876089469c766db2a6224d1f271abbf62