Resubmissions

07-05-2024 12:06

240507-n9pqxahf66 10

07-05-2024 12:05

240507-n9masafa6v 10

07-05-2024 12:05

240507-n9lz1sfa6t 10

07-05-2024 12:05

240507-n9ewpsfa5v 10

07-05-2024 12:05

240507-n9dnmshf57 10

25-04-2024 13:00

240425-p8x7bsba47 10

Analysis

  • max time kernel
    299s
  • max time network
    299s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-05-2024 12:05

General

  • Target

    63b087a9fa01c00b9f07712fa4c46e461245d5364606dd9dc10130d93415bd6d.exe

  • Size

    356KB

  • MD5

    6ffbff0cb624b4965fbea168ec43aea8

  • SHA1

    5be9a3b2238e13e0fa17ada96e4bb53a5b58fd81

  • SHA256

    63b087a9fa01c00b9f07712fa4c46e461245d5364606dd9dc10130d93415bd6d

  • SHA512

    edbcb9de0b4ff80da0debb6c0d8be7198efac3ba5534997396f4461a4b43dd897e09f126e68fe928e7c5f48446583c7ebce7757f4dd72f9bdb19a5e7934a04c0

  • SSDEEP

    6144:LXj4tVpmiFWkppKTXD6x/xai9VJrU+aUh5Px9YKRTw6pPZtM/FSpECb:LXj4tyxMuT6jp9Vvh5PPdZM/0GCb

Malware Config

Signatures

  • Windows security bypass 2 TTPs 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Windows security modification 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63b087a9fa01c00b9f07712fa4c46e461245d5364606dd9dc10130d93415bd6d.exe
    "C:\Users\Admin\AppData\Local\Temp\63b087a9fa01c00b9f07712fa4c46e461245d5364606dd9dc10130d93415bd6d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\20633196424877\audiodg.exe
      C:\20633196424877\audiodg.exe
      2⤵
      • Windows security bypass
      • Executes dropped EXE
      • Windows security modification
      PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \20633196424877\audiodg.exe

    Filesize

    356KB

    MD5

    6ffbff0cb624b4965fbea168ec43aea8

    SHA1

    5be9a3b2238e13e0fa17ada96e4bb53a5b58fd81

    SHA256

    63b087a9fa01c00b9f07712fa4c46e461245d5364606dd9dc10130d93415bd6d

    SHA512

    edbcb9de0b4ff80da0debb6c0d8be7198efac3ba5534997396f4461a4b43dd897e09f126e68fe928e7c5f48446583c7ebce7757f4dd72f9bdb19a5e7934a04c0