Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
724f18dce5a53a2547ef3babedf4ff60.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
724f18dce5a53a2547ef3babedf4ff60.exe
Resource
win10v2004-20240508-en
General
-
Target
724f18dce5a53a2547ef3babedf4ff60.exe
-
Size
684KB
-
MD5
724f18dce5a53a2547ef3babedf4ff60
-
SHA1
7d31d0a4bd319db7eaa49e855272cfdea425bb72
-
SHA256
65f7ebc11cbc4f159ed5ed79d51b3f86417cc498e64adfffde5474689646265e
-
SHA512
a60176b55205d4b2c6b1f93d1ca46e5b2a47025f6f00adcf57959f2c6fee3fafb2afd696d7c714cdae71834d40986f829ee79449827b5bedd0d8588ac20c2ce9
-
SSDEEP
12288:fwDGo0iNyUl8n+OnrwF/w64BnxgLWIBwRnEmbbFdjqWeANhYnjg51s7h:46o0iNyU+ntrwFI6QnqLWIYnfbzjqmNK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2140 WindowsSecurityUpdate.exe -
Loads dropped DLL 4 IoCs
pid Process 1744 724f18dce5a53a2547ef3babedf4ff60.exe 1744 724f18dce5a53a2547ef3babedf4ff60.exe 1744 724f18dce5a53a2547ef3babedf4ff60.exe 1744 724f18dce5a53a2547ef3babedf4ff60.exe -
resource yara_rule behavioral1/memory/1744-3-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/2140-22-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/2140-24-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/1744-26-0x0000000000400000-0x0000000000515000-memory.dmp upx behavioral1/memory/1744-30-0x0000000000400000-0x0000000000515000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1744 724f18dce5a53a2547ef3babedf4ff60.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2140 1744 724f18dce5a53a2547ef3babedf4ff60.exe 28 PID 1744 wrote to memory of 2140 1744 724f18dce5a53a2547ef3babedf4ff60.exe 28 PID 1744 wrote to memory of 2140 1744 724f18dce5a53a2547ef3babedf4ff60.exe 28 PID 1744 wrote to memory of 2140 1744 724f18dce5a53a2547ef3babedf4ff60.exe 28 PID 1744 wrote to memory of 2140 1744 724f18dce5a53a2547ef3babedf4ff60.exe 28 PID 1744 wrote to memory of 2140 1744 724f18dce5a53a2547ef3babedf4ff60.exe 28 PID 1744 wrote to memory of 2140 1744 724f18dce5a53a2547ef3babedf4ff60.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\724f18dce5a53a2547ef3babedf4ff60.exe"C:\Users\Admin\AppData\Local\Temp\724f18dce5a53a2547ef3babedf4ff60.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\9iDEKdVR\WindowsSecurityUpdate.exe"C:\Users\Admin\AppData\Roaming\9iDEKdVR\WindowsSecurityUpdate.exe" -services2⤵
- Executes dropped EXE
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
684KB
MD5724f18dce5a53a2547ef3babedf4ff60
SHA17d31d0a4bd319db7eaa49e855272cfdea425bb72
SHA25665f7ebc11cbc4f159ed5ed79d51b3f86417cc498e64adfffde5474689646265e
SHA512a60176b55205d4b2c6b1f93d1ca46e5b2a47025f6f00adcf57959f2c6fee3fafb2afd696d7c714cdae71834d40986f829ee79449827b5bedd0d8588ac20c2ce9