Analysis
-
max time kernel
92s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
e232399ba45ac62a06158ea55e764769.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e232399ba45ac62a06158ea55e764769.exe
Resource
win10v2004-20240226-en
General
-
Target
e232399ba45ac62a06158ea55e764769.exe
-
Size
1.2MB
-
MD5
e232399ba45ac62a06158ea55e764769
-
SHA1
953aea3af528492fa0464ee6a198a969fe2ef9a7
-
SHA256
c25d53b46bb85b9b81f140617cad54bba438e64072f5653bc85b62083306a7b1
-
SHA512
36c80858c0ac66d09bf2428eba92d17cc862cfe81a90465931711333981f3333425d2767350c246fddf4cb9f7eb65cc7c7b5952951094b697ad8210beda9eed1
-
SSDEEP
24576:IoqJ4jpebQRLI/bwKlVYswxTI95QnyOujfJzTKUckm8O3bb:IoqJ4jpsQkwKlFwxU95QnyOujrcGW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5048 install_msgskinner.exe -
Loads dropped DLL 2 IoCs
pid Process 5048 install_msgskinner.exe 5048 install_msgskinner.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\pack.epk e232399ba45ac62a06158ea55e764769.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231e1-10.dat nsis_installer_1 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4372 wrote to memory of 5048 4372 e232399ba45ac62a06158ea55e764769.exe 85 PID 4372 wrote to memory of 5048 4372 e232399ba45ac62a06158ea55e764769.exe 85 PID 4372 wrote to memory of 5048 4372 e232399ba45ac62a06158ea55e764769.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e232399ba45ac62a06158ea55e764769.exe"C:\Users\Admin\AppData\Local\Temp\e232399ba45ac62a06158ea55e764769.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\temp\install_msgskinner.exe"C:\Windows\temp\install_msgskinner.exe" "/LICFILE=C:\Windows\temp\license.dat" "/MC=C:\Windows\system32\rebtqdhtxb.exe" "/MCPARAMS=INSTALL:5029564|77|VGOOGB3955921*0.0.47337.1*15|6"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5d61d6c709e7947296603059f8bedeba9
SHA1bdcfc90c358c82be43ef85727a7bdfebbd6d1b69
SHA25665012a46603b7e13807938e2a61f3c2a60cced3fb3187dfab3e391705e2c3f63
SHA512ed5a6efd1dd5e2119a9c523b9f9154e13552b3538bf72f4b8b02d6a9c808c3ae2ba7613d9e2b3395237461703f2da0a1482a52727ffcf6fc967552390dab0f2b
-
Filesize
5KB
MD58be27f3bdec2b49d0a6a674716622304
SHA170d17db576ed484a4c0195571118d307fd4dc1b9
SHA2564fe0a8391574867d8bdc6fb33555d90e02796563f02d1e6536acc3294a85bd47
SHA512add9f37dd0d7a27f19d172c82599a79d049385c12cdfb78745ce2b0685ecea8f85c718bd62ecd671bbed949529429500853534b63226809e707ad3745a8fc801
-
Filesize
700B
MD5d74f35f3d7e84e6ab26fa29d3e82b03e
SHA1005385adb6997a185d05482319eab1fb891e4e6e
SHA256b94ef804b3cc2d198e72568f5f0ee817b594aa4710257a49e927c447c5116468
SHA512a177320184a622c4cbde823087e7bcdf799dd9199ad90949fc115e359ddf04fef5aa95ba8732f81c2a8f8f8b5862d60f4305d854f7ae72e3759bef03c7676ffa
-
Filesize
922KB
MD5f1da621246700a7c6e305cd0729402ae
SHA1e355def95bb8d886ceaaa97098608fcf0cb554f9
SHA256f032c0b30f554b65ad2aaa21cdd92e1e44a3948e58d81fe7226d997ca348fbb5
SHA512723ea53e78b8bcb1f44aaef10455a75fd275062c56d6cf667b56e876fd1de5af7fda866e71535d3b7e513a117a9aaa683e19d7b5f7e052bd6a8688a22cdc5a72