Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 19:08
Static task
static1
Behavioral task
behavioral1
Sample
16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe
Resource
win10v2004-20240412-en
General
-
Target
16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe
-
Size
31KB
-
MD5
7f8d47d581bd4be7e65c6380d37f8be3
-
SHA1
fc5784cba73c386fad4027759b0900c6cdc32240
-
SHA256
16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334
-
SHA512
024ee90ca38428c5f129225a8be84567ed29b96c6f2e7d5a2f24c3331cb67c66c28afacb54ef11cd71b6de907b369eaf53a07247d53514dc5ca042ee6e3da491
-
SSDEEP
384:tk2Wz6pL3a2a999999996cNyoYkytbdH4TIem29nm:K1z6pLxa999999996cgoYkytbdH4Uim
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1944 lsemc.exe -
Loads dropped DLL 1 IoCs
pid Process 2276 16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1944 2276 16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe 28 PID 2276 wrote to memory of 1944 2276 16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe 28 PID 2276 wrote to memory of 1944 2276 16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe 28 PID 2276 wrote to memory of 1944 2276 16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe"C:\Users\Admin\AppData\Local\Temp\16a964179a3d708afdf8f9d7357766eb7e7ccdb790e7d9981ab4d5ce68d3a334.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\lsemc.exe"C:\Users\Admin\AppData\Local\Temp\lsemc.exe"2⤵
- Executes dropped EXE
PID:1944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ce0cd1b428682845fc43fcb235aafac7
SHA18747adccee9886633b23684105e129f70449bb12
SHA256e1b4a99d0f76182f3ebaace0d0669e55d96ed3692f8bc72918b6a7eda81e1900
SHA51277512d1ebceb006bf91bab8798db511e61c43d5f51c5affcedf3a302567063b8ee04afa77e9b4bde12690877ca34eb013b667dc61fcca5a6dbcdc902a1a2f187