Analysis
-
max time kernel
60s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 22:55
Behavioral task
behavioral1
Sample
f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe
Resource
win7-20221111-en
General
-
Target
f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe
-
Size
822KB
-
MD5
40c5d3ada515e0a592cc6f4969fc1854
-
SHA1
e20e712480dff42e01cbc4482387a84edf62deb0
-
SHA256
f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097
-
SHA512
cd42d8fede2f79513e172e8c166c28cf5b48a7c5c4ade8a7e69b763d4bce6dc6e6629ff68a09a210130cc12a4819d1bee2af8e437c391456cd8932cec8165488
-
SSDEEP
12288:cMZSamKJgQeLuuPPkpuJy9oy71+dzjjkImJE3pY8WjNH2xZKABcyawffel:cMZ9lJg1L93Jy96jAspYrRWxRc+f
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1964-55-0x0000000000400000-0x000000000062E000-memory.dmp upx behavioral1/memory/1964-56-0x0000000000400000-0x000000000062E000-memory.dmp upx behavioral1/memory/1964-58-0x0000000000400000-0x000000000062E000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1044 cmd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1964 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 1964 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1044 1964 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 28 PID 1964 wrote to memory of 1044 1964 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 28 PID 1964 wrote to memory of 1044 1964 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 28 PID 1964 wrote to memory of 1044 1964 f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe 28 PID 1044 wrote to memory of 668 1044 cmd.exe 30 PID 1044 wrote to memory of 668 1044 cmd.exe 30 PID 1044 wrote to memory of 668 1044 cmd.exe 30 PID 1044 wrote to memory of 668 1044 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 668 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe"C:\Users\Admin\AppData\Local\Temp\f9ce6618724f20891ef9e68f12a248b71ae9999223659e7c0b9f83a16f5ba097.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\clri$nsx.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\attrib.exeattrib -H -R "C:\Users\Admin\AppData\Local\Temp\clri$nsx.bat"3⤵
- Views/modifies file attributes
PID:668
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361B
MD5d2c0aedbfed2065d94fc6892974f58ea
SHA1c18268764e1dbe29819eb2adc30a55a686a67f8f
SHA256b91606e6b5965351199069e1f9891b87ce6cff570f606a1c1d54fbe6de5c2f11
SHA5120b99e807cd37ffea6c22c952b1ade0574b1e0e49563f7f1cfbc18af597a4031beb264cbb2e488953a441deaaa8efb0758d9175bf19f5c0ad40f619a64d0506c6