Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe
Resource
win10v2004-20240419-en
General
-
Target
40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe
-
Size
22KB
-
MD5
7f219f14b25aec7f852ef4b2b5471b36
-
SHA1
1d3f636f88ad538d1831d032ef17219d32826de5
-
SHA256
40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a
-
SHA512
1a7b6a137bcfd9982881289cc984a24ac83c00644ba600258ea5762af2b2f9c4dc4fb8232d0097d67e67e431426f56c5f2967d430ab52b54c26f121f83ef3e18
-
SSDEEP
192:UHkr4ITvY5e+Drpcyr+o7wHF+ADmXQAvg9X5zIl3y+GxRRkDQvIEfk+qdR:UzITvSruyioUHFMvezASHRkDQ5fk+W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2964 kgfdfjdk.exe -
Loads dropped DLL 2 IoCs
pid Process 2904 40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe 2904 40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2964 2904 40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe 28 PID 2904 wrote to memory of 2964 2904 40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe 28 PID 2904 wrote to memory of 2964 2904 40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe 28 PID 2904 wrote to memory of 2964 2904 40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe"C:\Users\Admin\AppData\Local\Temp\40e4efca3dc2d1e320b1810fe31ed816a9249f0745f0255004860690f5752d1a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"C:\Users\Admin\AppData\Local\Temp\kgfdfjdk.exe"2⤵
- Executes dropped EXE
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
22KB
MD564e60cb746392a4895541953ce027805
SHA186867af05b9bef4d5da3f99f2210b876b15e21f9
SHA256b2122ca2b90c2504b77f6326be49db0fd3dd14d6e418db3457f6654169e7b998
SHA5127654580f441fee33398538c0ebb852d037d1f76061d6421e5cbed6077941697078f8f61d359c9b4757c19c0e7c406c17d710206148dc24f55200a9483b056d93