Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe
Resource
win10v2004-20240704-en
General
-
Target
5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe
-
Size
85KB
-
MD5
ffaf45b51f6880d6c1d49470f561e06b
-
SHA1
ca2091db287f99428733d716680e7f637d1462d4
-
SHA256
5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb
-
SHA512
e4e700630adf1accc420c160c4509625e8159a11c4836da138395772731b2c211c9ce3401bca67d4a0b7ed1f22bf88723f2f7f61251f9a200798b586f8e6b6fc
-
SSDEEP
1536:D00URPnKfZrT2DawRR8JfP3zZB355B/CYTjipvF2a:D00URSfsGyR+ZB355BqYvQd2a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1764 odbc32.exe -
Loads dropped DLL 1 IoCs
pid Process 856 5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Network Services = "\"C:\\Windows\\SysWOW64\\odbc32.exe\" /O0" odbc32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\odbc32.exe 5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 1764 856 5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe 28 PID 856 wrote to memory of 1764 856 5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe 28 PID 856 wrote to memory of 1764 856 5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe 28 PID 856 wrote to memory of 1764 856 5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe"C:\Users\Admin\AppData\Local\Temp\5b068402c30db67a56a03d9c80546c565da45a5973f147f6b19aa23342c809eb.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\odbc32.exe"C:\Windows\system32\odbc32.exe" /O02⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5e1cd645fd753aa60247f3ac71592826c
SHA1c7c6e1d87fed90d512a27188952a4cf8c9e345d4
SHA25690cbc93e06c7f7f688de6186033e553cdb1892b92d07ce0aad85c187fedc4835
SHA512cd063bd76fa88fe130cdfe7e72f77021ce01eb6d0303b6e74cae217a90ee5532b4ca8c6ab1dee183bf009d13a747cccefb377f1433f85897a3b3449558eed31d