Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/06/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
aquatic/crack.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aquatic/crack.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
aquatic/loader.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
aquatic/loader.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
aquatic/main.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
aquatic/main.exe
Resource
win10v2004-20240611-en
General
-
Target
aquatic/main.exe
-
Size
24.1MB
-
MD5
c4639a9dd4fa418a1e2e5537b9a53bfe
-
SHA1
9fea0f4615170667aa59dac92f6d424455b5fc54
-
SHA256
6548853e51522d28bc2d4ee6dbecdfe7be496462cb87f26587f830374ce07ec7
-
SHA512
2e5f53a2d4bae0028ecb715485327db9da7aeb45176e7e54db039516dab6002f41b5f44ae728f7752ee840f34b14ac78698cea3bc4cc2d00ea815873bad6b692
-
SSDEEP
786432:8Ljr7FsBzlI0ecXYc1xk/cBFG8zv7NRDZPA:oezlI1kLxJBFGu7HFY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2596 main.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 main.exe 2596 main.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2596 2104 main.exe 29 PID 2104 wrote to memory of 2596 2104 main.exe 29 PID 2104 wrote to memory of 2596 2104 main.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\aquatic\main.exe"C:\Users\Admin\AppData\Local\Temp\aquatic\main.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\onefile_2104_133629590696698000\main.exe"C:\Users\Admin\AppData\Local\Temp\aquatic\main.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081
-
Filesize
36.6MB
MD5fd558700e832c55b847fbaa2f9c77f48
SHA1db8a95fa38c5f59f7908c4a36efe4f62191c3f77
SHA25689ccb259276786bda67b5f70d1dbc55eb7d0ab6333254f75b6f60fee10c30637
SHA51214d275d4f3b9c4c06920dbc7fd85c01357402eba85968a06cabb0852c43d9d64d1d30e9dffd744c450b3174064f95076369f1f8173dcfd3412b89f194f71dc41