Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-04-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe
Resource
win10v2004-20240226-en
General
-
Target
55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe
-
Size
5.0MB
-
MD5
a21768190f3b9feae33aaef660cb7a83
-
SHA1
24780657328783ef50ae0964b23288e68841a421
-
SHA256
55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047
-
SHA512
ca6da822072cb0d3797221e578780b19c8953e4207729a002a64a00ced134059c0ed21b02572c43924e4ba3930c0e88cd2cdb309259e3d0dcfb0c282f1832d62
-
SSDEEP
98304:NzTZ3cINQscs0m++LNkT6OpwDGUUH57yvZ/49Mr8EO3QhA9Kq:Nzt3cINQscNmvLCwDkHEvZ/4R79x
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2960 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1904 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 1904 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1904 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 1904 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2960 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 28 PID 2212 wrote to memory of 2960 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 28 PID 2212 wrote to memory of 2960 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 28 PID 2212 wrote to memory of 2960 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 28 PID 2212 wrote to memory of 1904 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 29 PID 2212 wrote to memory of 1904 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 29 PID 2212 wrote to memory of 1904 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 29 PID 2212 wrote to memory of 1904 2212 55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe"C:\Users\Admin\AppData\Local\Temp\55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe"C:\Users\Admin\AppData\Local\Temp\55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe"C:\Users\Admin\AppData\Local\Temp\55e4ce3fe726043070ecd7de5a74b2459ea8bed19ef2a36ce7884b2ab0863047.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD59d007011891f8ecae8df09f367324507
SHA1a7701407370d3dcf2ba103a6a7abda8c7058bc9e
SHA256e1dff2bd65064411c1fb5b279c22ff0a83aebb8780e6990f5a5d104b96492bd5
SHA512f652ac037683b832c03752981938c7f8a19ac8e695bbe3348b6c68b4e58634ea0925dca0d215a9c540405ec74e0d3314594951967a6df8f20794d758dcbbbf01
-
Filesize
7KB
MD5919d083ebe5a47ee5b53ebd0f12afb4f
SHA15d12de72e422e4fc80c43a7b1feb695a85585292
SHA25661ce8e9caf0fcca94a726714885f2810bee1502d77d4639da888ab417dab9f3e
SHA512230dffa0140f56af8ef1f85991627ab627d524eb78f86c6792e1725a54d3910f94bf8e8c765876803c6c38ff8c6099f811b4064e01cb4b57ce98eae55462629e
-
Filesize
367B
MD519cf46b29f53ccbabdbee76f6e77b24a
SHA1d60ec8f74c1e3059d4ec2d0a2698a6c5b492831a
SHA2568a1e247fc060e6e160e9054208aec43f60e3d3d040f43513bf3b37289619ff93
SHA512a441db980b8ee3e893b025662fd6b7d57d77504dd1e3455cdd8076bdaa1fa3df7dacf50611fac52c3d8f44d31909cc5ebb72ad3fcf663db064d8e895c3911491
-
Filesize
1KB
MD59ea86f2026fec8a8a3634485fafb57ec
SHA168867972919c958d72a34aff55f426ed36d3e139
SHA256210d5a1c5c222a8820e513ae9ee0f7ddd286724e492ae393adc41f9ba49a9587
SHA5122ac5f209cc0e1540baf6e9ed5a18134fe27d51d267692e6907b71fc2b7a131c27206cba2d0d893b6236c02b372e23e98bfd19e571998429dd090c33dd4d7d2fb