Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
06-04-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe
Resource
win10v2004-20240226-en
General
-
Target
c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe
-
Size
452KB
-
MD5
67bc66e6ff29d89e806a7e53f8512f54
-
SHA1
fb144640771478d36ac67c6c7cd7d22bff3a432e
-
SHA256
c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582
-
SHA512
0a3bf4996843a6eb20fd594b4ec6802b9edc9ce21dbc126fe95ac0660f070a952880d8982114f113bee1301e4d7294b06a2438e25719dad6ab5e1197628a092a
-
SSDEEP
3072:Sw5rSWAkQfza8JvIoPvSIe6oy/uPy3mm0RiEBoQ:S/WYRJvnCPWQmJEBoQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1748 c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe -
Loads dropped DLL 1 IoCs
pid Process 2496 c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\jyyEGgL\nFKvay.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\SysWOW64\jyyEGgL\UUQqtVBC.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File opened for modification C:\Windows\SysWOW64\jyyEGgL\UUQqtVBC.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\SysWOW64\NEcxpBS\CCVsiU.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\SysWOW64\NEcxpBS\QaXCSB.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\puRTEHnC\eIJeFo.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\eColFrQV\aeQNSs.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\HXPvjrLF\SakrHX.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\HXPvjrLF\jgQTErN.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\LOOKispE\hMhKdY.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\RiKcOAqk\bYTOoa.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\sEgRCXug\mMjEuKd.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\LOOKispE\BtRFHUn.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\eColFrQV\dEXaSjsB.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\RVuFyLus\OBQfSPh.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\puRTEHnC\tqybGNhX.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\RVuFyLus\tqsgVw.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\sEgRCXug\SlrFwx.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Program Files (x86)\RiKcOAqk\WPanvYe.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\BuAUtaqU\FiufCxwx.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File opened for modification C:\Windows\OpIidLGO\eCENTQU.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\BuAUtaqU\tVIukRV.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\ditpAsSV\YcuKcmuY.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\ditpAsSV\rfhTQVuB.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\UxQjynBX\IrOSaDq.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\LJbfma.dll c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\tHDJTkp.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\OpIidLGO\eCENTQU.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe File created C:\Windows\UxQjynBX\ymppROTe.dll c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1748 c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe 1748 c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe 1748 c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1748 2496 c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe 28 PID 2496 wrote to memory of 1748 2496 c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe 28 PID 2496 wrote to memory of 1748 2496 c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe 28 PID 2496 wrote to memory of 1748 2496 c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe"C:\Users\Admin\AppData\Local\Temp\c1e1989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\GAvfkXX\c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe"C:\Users\Admin\AppData\Roaming\GAvfkXX\c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\GAvfkXX\c1e989a0202365963a5a8c129df72f53dfcfe38fb328d64aa34a276c3056582.exe
Filesize455KB
MD5b1bbf36866b90aa18d50fa3827f7c869
SHA1532cf9f2c61e0acdfaefe57e711b762518d61726
SHA25661700bbebea2eab883d73e8ada5cbd8e1b6f4a1a1e3f94e69901de15d27eba6f
SHA512bc08309fca239d07a839b1f4b89c5374efdaa1d0bf1d5243f8d2afd42e06b2b941e4e4b7d8f730f3255ffd97b4654bc4b5f6cb56140664cfe2c77857c1947c53