Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
48f66e4072c8f91b86ae7e22586f5580N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48f66e4072c8f91b86ae7e22586f5580N.exe
Resource
win10v2004-20240709-en
General
-
Target
48f66e4072c8f91b86ae7e22586f5580N.exe
-
Size
327KB
-
MD5
48f66e4072c8f91b86ae7e22586f5580
-
SHA1
399636d10bc2df6179b85c506311d5ddf6ecfd12
-
SHA256
6d5952633a4426170c88ee93645e6d7373db79c30d2aa1ef66d82a164194a3aa
-
SHA512
87f59354cbce5bb60c3baf00fff216da257f78b7f5c4a2671197a86fde4bb693427f027a6667ebae6c856b17a2f94d0019b6ebc36699850219dfe3ff6189d910
-
SSDEEP
6144:8rPbUzkuvcBYC47l2xx+DOd2cHRcsgIEHQi8KePBE:8rEkuveY3LDO8IRcsgISQBKePK
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2264 48f66e4072c8f91b86ae7e22586f5580N.exe 2264 48f66e4072c8f91b86ae7e22586f5580N.exe 2264 48f66e4072c8f91b86ae7e22586f5580N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 48f66e4072c8f91b86ae7e22586f5580N.exe Key value enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum 48f66e4072c8f91b86ae7e22586f5580N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2264 48f66e4072c8f91b86ae7e22586f5580N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2596 2264 48f66e4072c8f91b86ae7e22586f5580N.exe 32 PID 2264 wrote to memory of 2596 2264 48f66e4072c8f91b86ae7e22586f5580N.exe 32 PID 2264 wrote to memory of 2596 2264 48f66e4072c8f91b86ae7e22586f5580N.exe 32 PID 2264 wrote to memory of 2596 2264 48f66e4072c8f91b86ae7e22586f5580N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\48f66e4072c8f91b86ae7e22586f5580N.exe"C:\Users\Admin\AppData\Local\Temp\48f66e4072c8f91b86ae7e22586f5580N.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\_tin6711.bat"2⤵PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368B
MD53a9830a2f57ef1e602de02bd9cc8eb56
SHA15135a0295755e536b833c6c6010900ff99cdbabf
SHA2568d138bedf3228f7ef9405940526a73f49395fd2917aa22e7d5596297e222da42
SHA51287ed85acdc1509bb02e437f50e7a90695f66b2a7a996a526f0310ba277de9ce8d7343983e2ae0b5dbedcca832bb90da802d7182972f1b14be0a203cfbd14cc41
-
Filesize
50B
MD5e95b41bdc7cf24b22465530e591d4f13
SHA174099d9fa2fd3b56f7ca8df74db9e7a4f47356bc
SHA2569f857823f50a149493ebeba3007e9a759a7e96cc5a2c3554af8acd4fb90b0334
SHA51296eb3e5a3d3a21d12c1df667f49d11086256da08804fda055582b2cd838d7424a5f81e4615dad5f1dc9ad58a88cf48fa456a5c36a1be0c5c78969ff9c0ae3d6c
-
Filesize
2KB
MD50741869b7a2ba1b03c786427671272be
SHA1d66e5450264d65653cfbd28cf61e88847da2c86b
SHA25611e23a437ea1071bea16172258577ef7a8fb2b86382f895597f58953695f03f9
SHA512403bf96446e10d04b5f540780907ebe3f75ce43764e5fb5126b2d9b891553fc14d7f1d110e34ef70fe68df8df45df8859cd16b9770afea9e92ec394120d882fa
-
Filesize
15KB
MD5e717f6ce3a7429bfa6d7f3cf66737a4b
SHA101f4042589b4ed88c351ffeac256be7a9d884818
SHA2567be720a73ba8b084702c89f64a9b295fad92545d6ba781072cc056823f9a7633
SHA51265a9a27430811aa01b55cf365f8b7b9f03e70d32ec60e0706242bc568242bcd493999dc1b02d92bf0d01c0095c8c38d30f282a998cafb80e60ad07e0d875ce80
-
Filesize
14KB
MD5a869d21eb457ca588d16f43a91126be6
SHA10ccd2a84d9053d4188a3d34ffc2285000860d433
SHA25688ab6715c4d86b3b191611dec390f32ea69aa1e1c796ac212f20ac237e0a0097
SHA5128d0e3ce7d73f8481bc954465d07c55a5b996ef3bb21fdd0452206117c6a56df3c531bb67227f8d41a8fac28dcde549d86f1f7a0b3a226dda7c736105b42964fc
-
Filesize
269KB
MD5af7ce801c8471c5cd19b366333c153c4
SHA14267749d020a362edbd25434ad65f98b073581f1
SHA256cf7e00ba429bc9f27ccfacc49ae367054f40ada6cede9f513cc29a24e88bf49e
SHA51288655bd940e9b540c4df551fe68135793eceed03f94389b0654637a18b252bf4d3ef73b0c49548b5fa6ba2cf6d9aff79335c4ebcc0b668e008bcc62c40d2a73c
-
Filesize
91KB
MD51e003f7cd537f729059dbf13c4b177ed
SHA18b13d68eeee3e3be94d961e03a57353245df2fdd
SHA2563b4b5014529df5e4884b64e60c2bbb0a21c986a15f84d82dc2d4490a020741f4
SHA5127ca111f01d6e9180bf1c5b8d6875e92182edf40c211888716ee1288d08dd7b68dacaeeaf2acc614d2cf4ca49a1eaa5228b5124572f628a937f895b05f5764fc0
-
Filesize
183KB
MD53530911a0588f1bbae2d8bba350b4474
SHA1998bd2fe9abc3a81669330353b695e4d879b5e93
SHA2564c2fdb86e7690e62dfd26a9b36d6b5f7a12b11d33c40ff0faa1aca54b667b6ee
SHA512f183b9338232a59b000c758726c24cbbf74d7e5e3ad02da4977400ef9bcf1320ff211647de6a9273afc6605efc15257a838482810de828c4605f294b6faa6e14