Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe
Resource
win10v2004-20240709-en
General
-
Target
543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe
-
Size
11.5MB
-
MD5
2619b49efeb36039e12a0c0feeedc58d
-
SHA1
47dd9cea6caa0149a3643c461a42e59291e1cf74
-
SHA256
543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129
-
SHA512
b2878b6c7479fbb1ee1ae2679643f0d5df0e19187c1a2eaca72c69b43e28a1262e200b62a64b9f79e1a98f97893ea2b652b022b0ebafdaf6a3405a2bc598c143
-
SSDEEP
196608:n2Gtl6DPRKTkNg8h8V2KQqGfyxXIicOExzUx8Bssun3f6B2+FGjqBwHs2q:2GtA7RKQNg8h8V2KQH6uBsc9oqBF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe -
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe File opened (read-only) \??\E: 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe File opened (read-only) \??\F: 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2708 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe 2708 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2760 2708 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe 31 PID 2708 wrote to memory of 2760 2708 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe 31 PID 2708 wrote to memory of 2760 2708 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe 31 PID 2708 wrote to memory of 2760 2708 543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe 31 PID 2760 wrote to memory of 3008 2760 cmd.exe 33 PID 2760 wrote to memory of 3008 2760 cmd.exe 33 PID 2760 wrote to memory of 3008 2760 cmd.exe 33 PID 2760 wrote to memory of 3008 2760 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe"C:\Users\Admin\AppData\Local\Temp\543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2FA428009CB449918875410398C5CD90.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
F:\996m2\543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe"F:/996m2/543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129.exe"3⤵
- Executes dropped EXE
PID:3008
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD538a9332ff2dacc107ab3af22a0c41484
SHA1795f79956151bd8b242010a04dd7d4409a6cbff9
SHA25637ada7613328a35140593766a36aa6edd9953037ba8efd509250f87a9cca96c4
SHA51262137462251e94a444bc2394326f7d2c8ae0c3de43c1c618c16158c0b0059ee8dbcfd226c151043e63ab5d9c5f6faf1feda6c4dd2b4ef6c83c218c66c077551d
-
Filesize
75B
MD5e3febec7c9d89d6c7dca6f55195ed89f
SHA1f98fb4c0fd3b7c926e1875fda3566388903f4eef
SHA256d7e3aaf8d14b12596ce20a82487200fd3daa34db92f06c92703600519f02447c
SHA5122c034ddf1eea4addc7eca9206e176083a363d5cb69ed8acd87f1fc6ba0c6fa7a7e004550dc7257bcb237d78afe8fb672c695a6b073643cc2c4efb9477321f1bf
-
Filesize
11.5MB
MD52619b49efeb36039e12a0c0feeedc58d
SHA147dd9cea6caa0149a3643c461a42e59291e1cf74
SHA256543a52f807eae486f192899530513ee26884d7203aeeec0e4dff9a2cad930129
SHA512b2878b6c7479fbb1ee1ae2679643f0d5df0e19187c1a2eaca72c69b43e28a1262e200b62a64b9f79e1a98f97893ea2b652b022b0ebafdaf6a3405a2bc598c143