Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
4ad5fe23f0d59595ad193ef10f06ed50.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ad5fe23f0d59595ad193ef10f06ed50.exe
Resource
win10v2004-20240508-en
General
-
Target
4ad5fe23f0d59595ad193ef10f06ed50.exe
-
Size
57KB
-
MD5
4ad5fe23f0d59595ad193ef10f06ed50
-
SHA1
60885e6f8a436fe1f8c25f20a2a5958c95a916f8
-
SHA256
1a777c1a187d5ed226b1aff1d3cf72420b575997eb0349997c9b1bb72ebb2dc5
-
SHA512
2478043f7d5f9292572800324a038950bd1074d20f3fc0e799505768b475e52f5b43621ce8ba000a77ca3ae4e73219a4d6e5a30fd3cf9f5e48735787f6f78904
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4ICNBCXK9XbTb8pur:bIDOw9a0DwitDZzcTLr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 lossy.exe -
Loads dropped DLL 1 IoCs
pid Process 2864 4ad5fe23f0d59595ad193ef10f06ed50.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2796 2864 4ad5fe23f0d59595ad193ef10f06ed50.exe 28 PID 2864 wrote to memory of 2796 2864 4ad5fe23f0d59595ad193ef10f06ed50.exe 28 PID 2864 wrote to memory of 2796 2864 4ad5fe23f0d59595ad193ef10f06ed50.exe 28 PID 2864 wrote to memory of 2796 2864 4ad5fe23f0d59595ad193ef10f06ed50.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ad5fe23f0d59595ad193ef10f06ed50.exe"C:\Users\Admin\AppData\Local\Temp\4ad5fe23f0d59595ad193ef10f06ed50.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD508e0e492aee8d11efae4999404dcc9db
SHA143d6b37cc423e8ca013775a24d0c20e32450eaf4
SHA25665a1652ee1d0d4ae8cdbdf286552ea02f40ef36cf3628e93e3fa05406f4dbf22
SHA51257ba1a6e2765def4039c19049a8044b40cd45cbef83577faaf610331e6ddc491e8637a36c9a9fd85e092ea2c4c13a6a77f4ae0dc9daf2b36b2f74ee89658cfca