Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe
Resource
win10v2004-20240426-en
General
-
Target
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe
-
Size
56KB
-
MD5
b342deb33875244f22887978925f9867
-
SHA1
580fa51b67f04de93632685a8fe93f8698084e16
-
SHA256
0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1
-
SHA512
459e77014c9b635bb6c6ad158519f111dcadb76a0e304ac8b639f03cb97c1f26a60992c0e6ad2b91d03338fd26f84a14cbd2c6ade03aec77d183a92bb823be3c
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTb8pup:bIDOw9a0DwitDZzcTLp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2372 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2436 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2372 2436 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe 28 PID 2436 wrote to memory of 2372 2436 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe 28 PID 2436 wrote to memory of 2372 2436 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe 28 PID 2436 wrote to memory of 2372 2436 0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe"C:\Users\Admin\AppData\Local\Temp\0712d9fa2daa1d9fc24b1e5247ba4bd06e739ed3d10950f80499980e3f208fe1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD57a73337ec0560d0c6ec7cab9395b931f
SHA178679d8df5494fa6ecd289c6a8dcd287df261ab1
SHA2565c0707d8ad6bacb929240813e8dcc3f7439bdc5a253eb6357e3d5682d52e1a48
SHA512ad4a46b6547456689f6f56663c12b0314e055134cb8b238a0139f39b31d8abbff7159d6882aedbefe9427fa83311e967deb91fc3ea25d4e131f92da8ffb1937a