Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe
Resource
win10v2004-20240226-en
General
-
Target
edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe
-
Size
6.0MB
-
MD5
608fbed76c92b366b9132dc95096b291
-
SHA1
80811c0693ff2d1827f4a2f35a2eb00a5531f4d3
-
SHA256
edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26
-
SHA512
8278ff45aa7e03837249d79a216159a7b3290f2b35f6f01ae576e39dc76caeb3e3aa31155f6f7cb0717307e184756e804a4ab88ae632dcd9a7ebbfd1ebba1a07
-
SSDEEP
98304:hdSmvzp/urQMGc4E9PjKjT5QZvG0NDxx3JBAUZLUJa+:Z69Xe8G0N9x3JVgd
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2700 edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe 2700 edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe"C:\Users\Admin\AppData\Local\Temp\edc201d2bd39774c27add8ef3214f77a45684b67a2fff7b18800a890a174cd26.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.8MB
MD54c8066482756bd927aff4cf1df9aa5a6
SHA19830f4bbf827c3b0179a94e70d275dbf819fdfc6
SHA25672f2ab23ff9895118114d16faddd1b59b8d6d9a9a2f6792290671b6c21ed704f
SHA51240531913516c9c684b5c1f1508f39498d1a89aec07774965926ef5f563ead9d3c00cb218f3f7e9febd0e773cbd2c35559eb2e1732f8a8e798691989e565123c6