Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-03-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe
Resource
win10-20240221-en
General
-
Target
1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe
-
Size
9.2MB
-
MD5
6ff07f91eec875d0a044c73d4ad89b66
-
SHA1
7a9fe53800e419a027e899e84da5037f80bcb942
-
SHA256
1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4
-
SHA512
8f249f8362aa93696a8c75e46c4ace222198cd52cfec1abe5b5d19e1257e610228d15ff36628cd9ab0a9202b27c6380de48e6aa09605d795b4bdcee42e5c0953
-
SSDEEP
196608:O+yBLycnfg7zk5nOz9UToMWnYuz1gZgc1nyDWeyHy:ug7zk5n4MWnYuR6gcMDWPS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
noicon.exepid process 2624 noicon.exe -
Loads dropped DLL 2 IoCs
Processes:
1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exenoicon.exepid process 2352 1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe 2624 noicon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exedescription pid process target process PID 2352 wrote to memory of 2624 2352 1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe noicon.exe PID 2352 wrote to memory of 2624 2352 1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe noicon.exe PID 2352 wrote to memory of 2624 2352 1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe noicon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe"C:\Users\Admin\AppData\Local\Temp\1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\onefile_2352_133558158161884000\noicon.exe"C:\Users\Admin\AppData\Local\Temp\1f8867ada4ccbaf5d2d673607a54d043af5702083884050d58bc4349ca6bf9d4.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5c17a48676cd699a61f9650c89154203f
SHA11f53768aaeef3637363c43b72d67d0a4c062db01
SHA256249e6a23ca5763af015f9c9c78d6e787ae1252ee8fb340f431859cb0b28bc128
SHA512eb88e849deccc515495501eaa56f732a344ec334efbb2fcc24e95f9b8610656761992f2f2a3a314b1b37f58436c2745e26fa8fd64925370706ccb2943ff7cab5
-
Filesize
5.5MB
MD5d06da79bfd21bb355dc3e20e17d3776c
SHA1610712e77f80d2507ffe85129bfeb1ff72fa38bf
SHA2562835e0f24fb13ef019608b13817f3acf8735fbc5f786d00501c4a151226bdff1
SHA512e4dd839c18c95b847b813ffd0ca81823048d9b427e5dcf05f4fbe0d77b8f7c8a4bd1c67c106402cd1975bc20a8ec1406a38ad4764ab466ef03cb7eb1f431c38a
-
Filesize
9.6MB
MD5e7e6b39702664b6577f0b36c092352c2
SHA15c10dd3ec19392d971873bd03a9795fa4aee9caf
SHA256b2dea160bb2f4a1607620fd847ceb61296c0e974799532ed86293575b6de1d10
SHA5123bdac4e148029ba062d955d5d768b8e3ae615c7f1e0201430e28f1154685f170367c2d684ae3e863edfbf6363600b68a38c9c12cda9df3991ca039574381ed59