Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe
Resource
win10v2004-20240508-en
General
-
Target
10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe
-
Size
82KB
-
MD5
0fe1da6400dd50e389be159cfc62a143
-
SHA1
abcc8e403af44dc8e64b394d89cfbc9efd05a3d6
-
SHA256
10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7
-
SHA512
dc910ef25f8341fbfc880195e5b4dc08cbbc39d59a7ff0b486751653dfcf06ac37fab74f7dfcccf9f996d04ba54a136933365f6d9fd5400c249266cf14979a40
-
SSDEEP
768:eFq/4qn0F1raGCI3FfeMLT++G31LSadk344524444/M5zy6wSQte9SOVmhf9Ezp:qk4e0VCI33T++C1uaeN6ytQteVmhFEN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 edurss.exe -
Loads dropped DLL 1 IoCs
pid Process 2952 10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2348 2952 10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe 28 PID 2952 wrote to memory of 2348 2952 10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe 28 PID 2952 wrote to memory of 2348 2952 10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe 28 PID 2952 wrote to memory of 2348 2952 10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe"C:\Users\Admin\AppData\Local\Temp\10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\edurss.exe"C:\Users\Admin\AppData\Local\Temp\edurss.exe"2⤵
- Executes dropped EXE
PID:2348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5a5cbde71e6ce20b3eeff474e0eb75f02
SHA1681eb987043a52612f92f7a45c50f9bf751f02bd
SHA25607fe5822066ed6a1fa299df845e709652c10c7b58e35a62fac8bb2479b8c9320
SHA5127bc93a1a17af1e878cf3e4bc63e1684b343116f165c9d5c9cdd77ab4d3a71035722659ceb51aa203624e9c1fa2643de5b12c9a760be03a5648f5cbe1443a4b79