Analysis
-
max time kernel
162s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 10:51
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
3.8MB
-
MD5
e546506082b374a0869bdd97b313fe5d
-
SHA1
082dc6b336b41788391bad20b26f4b9a1ad724fc
-
SHA256
fc19f3275d02764cf249dc6fe8962e06b83a4f5769cc369bc4f77b90c567df18
-
SHA512
15a8d7c74193dffd77639b1356ccbe975d17de73d0d6d177b8ecf816d665f620adefcded37c141bac0b2d8564fbba61aca4d9b01885740f23fbcc190515cbd08
-
SSDEEP
98304:uSCb8xJlb0VgU/vZaZKa4opQILfbsLajDMWEeq7PbUs6En5:uH8HCOUZakpAbjbsLsMmqM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
tmp.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString tmp.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
tmp.exepid Process 668 tmp.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
tmp.exepid Process 1932 tmp.exe 1932 tmp.exe 1932 tmp.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
tmp.exepid Process 1932 tmp.exe 1932 tmp.exe 1932 tmp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
tmp.exedescription pid Process procid_target PID 1916 wrote to memory of 668 1916 tmp.exe 27 PID 1916 wrote to memory of 668 1916 tmp.exe 27 PID 1916 wrote to memory of 668 1916 tmp.exe 27 PID 1916 wrote to memory of 668 1916 tmp.exe 27 PID 1916 wrote to memory of 1932 1916 tmp.exe 28 PID 1916 wrote to memory of 1932 1916 tmp.exe 28 PID 1916 wrote to memory of 1932 1916 tmp.exe 28 PID 1916 wrote to memory of 1932 1916 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD523280d9475423b8ec9805b6a3e4d33c6
SHA17b77be96c5dade9c39ecbc10e3248010bc41b8da
SHA256898594583b40a46b52a3d552619e8a92d8c43680e93e141b7cd357c0027ed54f
SHA512316011ac102a5ee20767755d73b31a24d0592b553c1019e270497648a7ed56a525b823b873d0d687a667634b301e2111e8c74f94c4138ba0dad78900968797fe
-
Filesize
7KB
MD5bdff08fbd9862daf6a6f31f69a4d6b2a
SHA10f624c8126b842f88574f8fb8df0adced4b969c2
SHA256d6f7d37231e4c9edd3fd79f680f7c6759f5606778b5c08b07db4cc84facb43af
SHA5126f2f9bb1a424d6859607ed632980c6a582c7a1d4c1ff48695f8f4790165af1bdb27fd404891e4659f5e8cfd3b17a9403058ce4c8e797019127795141f974dc12
-
Filesize
2KB
MD5b8074aab4d908d30c383e1fdf97f2de8
SHA1fd772d4bbd5edacb963b1faea0b6ca14ded4aa1e
SHA2564b6663109242d1961a407d33dda3ca8124914cc9252f8e2653b072f175ed2fdc
SHA5129be1afd392a0f25a81af20b181a9be9f814bc77aa80e39f4e48d0f3d204bef6248dea89dca70b3439d7f251fabea09bb9eea093546b440d84630ca855a3cb6c7
-
Filesize
2KB
MD5b8074aab4d908d30c383e1fdf97f2de8
SHA1fd772d4bbd5edacb963b1faea0b6ca14ded4aa1e
SHA2564b6663109242d1961a407d33dda3ca8124914cc9252f8e2653b072f175ed2fdc
SHA5129be1afd392a0f25a81af20b181a9be9f814bc77aa80e39f4e48d0f3d204bef6248dea89dca70b3439d7f251fabea09bb9eea093546b440d84630ca855a3cb6c7
-
Filesize
424B
MD5c7339c969ba59731dccc3a6c14c4ca29
SHA12503913f08cb55df6c0d2c05429de90707426777
SHA256fb133f04512b67d4976ce507a1af453fac8f467fb9ea7ec89782c4f0a5a87813
SHA512dcdb6afb97d0f4f30e5a1122dff029e3c05d04c874e7b8493bd42977955a62e732a583a03d4af4372c029387cca7b9516aca9e66588777e4bbe02a95cd35876d
-
Filesize
424B
MD561fbfce0c6d24464034aa3358b711da8
SHA18a3d6f1e69739b1c605df4c3b88d499f76828ce4
SHA2564c60a4d0250f9b0670f69b76c398079d867431b7f6914b0e573c11d38bee53a0
SHA5129298940e67d95a218ae325eb75072ad165633f6f1fbb895b1c0ad5515c0bb3a626f0d94fe8a4785caaef7888f4af724826d29d50a2c1818f256067995555fbf7
-
Filesize
424B
MD561fbfce0c6d24464034aa3358b711da8
SHA18a3d6f1e69739b1c605df4c3b88d499f76828ce4
SHA2564c60a4d0250f9b0670f69b76c398079d867431b7f6914b0e573c11d38bee53a0
SHA5129298940e67d95a218ae325eb75072ad165633f6f1fbb895b1c0ad5515c0bb3a626f0d94fe8a4785caaef7888f4af724826d29d50a2c1818f256067995555fbf7
-
Filesize
424B
MD5c7339c969ba59731dccc3a6c14c4ca29
SHA12503913f08cb55df6c0d2c05429de90707426777
SHA256fb133f04512b67d4976ce507a1af453fac8f467fb9ea7ec89782c4f0a5a87813
SHA512dcdb6afb97d0f4f30e5a1122dff029e3c05d04c874e7b8493bd42977955a62e732a583a03d4af4372c029387cca7b9516aca9e66588777e4bbe02a95cd35876d
-
Filesize
424B
MD561fbfce0c6d24464034aa3358b711da8
SHA18a3d6f1e69739b1c605df4c3b88d499f76828ce4
SHA2564c60a4d0250f9b0670f69b76c398079d867431b7f6914b0e573c11d38bee53a0
SHA5129298940e67d95a218ae325eb75072ad165633f6f1fbb895b1c0ad5515c0bb3a626f0d94fe8a4785caaef7888f4af724826d29d50a2c1818f256067995555fbf7
-
Filesize
424B
MD5c7339c969ba59731dccc3a6c14c4ca29
SHA12503913f08cb55df6c0d2c05429de90707426777
SHA256fb133f04512b67d4976ce507a1af453fac8f467fb9ea7ec89782c4f0a5a87813
SHA512dcdb6afb97d0f4f30e5a1122dff029e3c05d04c874e7b8493bd42977955a62e732a583a03d4af4372c029387cca7b9516aca9e66588777e4bbe02a95cd35876d
-
Filesize
424B
MD561fbfce0c6d24464034aa3358b711da8
SHA18a3d6f1e69739b1c605df4c3b88d499f76828ce4
SHA2564c60a4d0250f9b0670f69b76c398079d867431b7f6914b0e573c11d38bee53a0
SHA5129298940e67d95a218ae325eb75072ad165633f6f1fbb895b1c0ad5515c0bb3a626f0d94fe8a4785caaef7888f4af724826d29d50a2c1818f256067995555fbf7
-
Filesize
424B
MD5c7339c969ba59731dccc3a6c14c4ca29
SHA12503913f08cb55df6c0d2c05429de90707426777
SHA256fb133f04512b67d4976ce507a1af453fac8f467fb9ea7ec89782c4f0a5a87813
SHA512dcdb6afb97d0f4f30e5a1122dff029e3c05d04c874e7b8493bd42977955a62e732a583a03d4af4372c029387cca7b9516aca9e66588777e4bbe02a95cd35876d
-
Filesize
424B
MD561fbfce0c6d24464034aa3358b711da8
SHA18a3d6f1e69739b1c605df4c3b88d499f76828ce4
SHA2564c60a4d0250f9b0670f69b76c398079d867431b7f6914b0e573c11d38bee53a0
SHA5129298940e67d95a218ae325eb75072ad165633f6f1fbb895b1c0ad5515c0bb3a626f0d94fe8a4785caaef7888f4af724826d29d50a2c1818f256067995555fbf7
-
Filesize
424B
MD561fbfce0c6d24464034aa3358b711da8
SHA18a3d6f1e69739b1c605df4c3b88d499f76828ce4
SHA2564c60a4d0250f9b0670f69b76c398079d867431b7f6914b0e573c11d38bee53a0
SHA5129298940e67d95a218ae325eb75072ad165633f6f1fbb895b1c0ad5515c0bb3a626f0d94fe8a4785caaef7888f4af724826d29d50a2c1818f256067995555fbf7
-
Filesize
424B
MD5c7339c969ba59731dccc3a6c14c4ca29
SHA12503913f08cb55df6c0d2c05429de90707426777
SHA256fb133f04512b67d4976ce507a1af453fac8f467fb9ea7ec89782c4f0a5a87813
SHA512dcdb6afb97d0f4f30e5a1122dff029e3c05d04c874e7b8493bd42977955a62e732a583a03d4af4372c029387cca7b9516aca9e66588777e4bbe02a95cd35876d
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
1KB
MD55e34b862a2873fb8ab613e5c8d1e85b1
SHA12eb02b4ac3075c08cc92b9834e709065cd6db3ee
SHA256d9b5d4cf4e4d9f7b72c24d005885fd6585bff7203818599136757e4dfbdee956
SHA512aa072a1eecf303f74ecb6c6a513dd4729a63ebcedca5fbb0982908ae1d8db79d3dbb85ed3be1b030ca53ccdba545e79215e1f3f8b3c99bbfbc808c0a50070c7f
-
Filesize
1KB
MD5eb9e7b8a87e1a419e64698572c4be8fc
SHA1248b5c9af5cf6ca237474459ce62fadb532c501c
SHA256eded7cede2d2ba62fca548ccde4afd9c847beb95b5297f6899fe70153e818ce7
SHA512fc459f1101c8a7259c19ba323b386d2c22eeeadbd7d842634c850820449817b136c86700257fcb1b020a6b59161f3a342fa4b67b2b3aaede75b8c02ade195016
-
Filesize
1KB
MD5eb9e7b8a87e1a419e64698572c4be8fc
SHA1248b5c9af5cf6ca237474459ce62fadb532c501c
SHA256eded7cede2d2ba62fca548ccde4afd9c847beb95b5297f6899fe70153e818ce7
SHA512fc459f1101c8a7259c19ba323b386d2c22eeeadbd7d842634c850820449817b136c86700257fcb1b020a6b59161f3a342fa4b67b2b3aaede75b8c02ade195016
-
Filesize
1KB
MD5ec79ee4199a7fd93087115a0e656e016
SHA1ceda654ab793bfc2207e22f2c787c463cd9d4a7b
SHA256c247c2f82caf6671de90db90665203f32499866894449890fca5e9234f7602c4
SHA51286a12d67b76b111f15be6292f808a51cc9d0d284dc5c3397acca03f67504c9e8414c53b9d2fce8a817096bd38f4998a8f408a33bf89fdf5d29da0b13821e632e
-
Filesize
1KB
MD523cc3a82c5611447dbd16e1669e620b6
SHA1d3c185e9fd1013d47c2d7bc70fe2c6ce72b7c017
SHA25602f53f55aa4b48c0018b1e74968283a292c885807e0f661e9551e9e49a326771
SHA512e70027ec4d38bda3cafe397a6a48a5b72f58957608a826d25b9ec1f391d3eef3f0c12b759a9fcfafc43f8f2a2aa04b516fe8e95101ade5da34e6941c99bc884f
-
Filesize
1KB
MD523cc3a82c5611447dbd16e1669e620b6
SHA1d3c185e9fd1013d47c2d7bc70fe2c6ce72b7c017
SHA25602f53f55aa4b48c0018b1e74968283a292c885807e0f661e9551e9e49a326771
SHA512e70027ec4d38bda3cafe397a6a48a5b72f58957608a826d25b9ec1f391d3eef3f0c12b759a9fcfafc43f8f2a2aa04b516fe8e95101ade5da34e6941c99bc884f