Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe
Resource
win10v2004-20240508-en
General
-
Target
813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe
-
Size
43KB
-
MD5
043347e0a64a51994f674a852f1f51ec
-
SHA1
b4a183562068af7a5c474f50751643e49acb7956
-
SHA256
813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4
-
SHA512
3acec1d9c4188d355dbfbb023e1b712f03f0c20b1458e9eb061d3b646370322fc0b3b3ee8032ddc501ecc33b436160916adc3707b41418504673334ba5e81463
-
SSDEEP
768:bCDOw9UiaKHfjnD0S16avdrQFiLjJvtAydP:bCDOw9aMDooc+vAy9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2080 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2248 813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2080 2248 813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe 28 PID 2248 wrote to memory of 2080 2248 813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe 28 PID 2248 wrote to memory of 2080 2248 813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe 28 PID 2248 wrote to memory of 2080 2248 813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe"C:\Users\Admin\AppData\Local\Temp\813160e8517447f2aa8f7234e9c3ff6f947b488d2394f6a43e3f1681133f8ac4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5695d977b7f9097a4e442954c990d7b19
SHA1bd68d7c06f91661d7df885abb0e05f441ee93502
SHA256c81d934ecd75e3df87445a64b9fef6bb3f84f7d51d986b4ccbcee90a44872127
SHA5124fda2bbb97422522bbd3d3f10803e465a85b8dc043b1926128b9314b37a68dd88c8b30e1819c16a7f0f34ab509854d193a343699b15c0d895d4318e9e957d607