Analysis
-
max time kernel
11s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
180b44ba88dd156e363703109c993860N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
180b44ba88dd156e363703109c993860N.exe
Resource
win10v2004-20240704-en
General
-
Target
180b44ba88dd156e363703109c993860N.exe
-
Size
14KB
-
MD5
180b44ba88dd156e363703109c993860
-
SHA1
be8752f3ee368fa17df6ed1a7bbb0e2a50a42c10
-
SHA256
9bd829134f201c681dd17c2e3a820cc2c279f12f5f2ef3b407338fa230abb727
-
SHA512
cf619f1b37e11265c213341939c9aa7eb6d3b824c0ee3b1f252ca2dc6110953db8e2e22b49604e6af13b8d8ba9c041b1c237ff62b00a7b400b51ee91b5efd45a
-
SSDEEP
192:Rt6tz6zQ6tnwR2bUifLDBH56oscMCg/HtH4KCHKNHpVEqSA:WAzVtnwR2xz9H2YKaKNHbzSA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1168 ghsdtd.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 180b44ba88dd156e363703109c993860N.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1168 2552 180b44ba88dd156e363703109c993860N.exe 31 PID 2552 wrote to memory of 1168 2552 180b44ba88dd156e363703109c993860N.exe 31 PID 2552 wrote to memory of 1168 2552 180b44ba88dd156e363703109c993860N.exe 31 PID 2552 wrote to memory of 1168 2552 180b44ba88dd156e363703109c993860N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\180b44ba88dd156e363703109c993860N.exe"C:\Users\Admin\AppData\Local\Temp\180b44ba88dd156e363703109c993860N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\ghsdtd.exe"C:\Users\Admin\AppData\Local\Temp\ghsdtd.exe"2⤵
- Executes dropped EXE
PID:1168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52ca3bd9bb0f8ca15d0b7d98a305ce623
SHA171efee1f70c8ac9abb8232d0b971e55a82fab99f
SHA256f871073c5e1098ba9dae88c3689057213d2b3487c6e7826ffffd8ace3dbcf634
SHA5120ee476e7ee5755116dca9f4bc83edfe7c48623e82fc181f4bc29119911ea9ecdda9c66459334f7caa5fc749ded8fdceaaa3a6e13afff96696871461c40a9f6a5