Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10/05/2023, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
H90490861252¬F.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
H90490861252¬F.exe
Resource
win10v2004-20230221-en
General
-
Target
H90490861252¬F.exe
-
Size
667KB
-
MD5
f4ebd2a2d0ff857cca296b6d868e94b0
-
SHA1
e284b010ec634795cfe4da2cb4ea376480fdb6d4
-
SHA256
3994c8e0aecd846d4745bee253585ab2787b6b5fe80ccac607dada63db1b4177
-
SHA512
11811a3f7c67c279f754f4202c4c24cad8d2953b0863bb2663019b3d5ca966e605dad567241e88cdd4905aba3e5b8243292a8e74c68d8805e6d228df17c5f828
-
SSDEEP
12288:Rgi0cO/aRB7kBfqQqVw2yJ5rcQm6dTxqooWjrARw75WSaLpG/4YBZRyIL9oI0+Ip:6i0vTcSaLpG/4AZfBT0+Ip
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bdcam.lnk cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1164 2044 H90490861252¬F.exe 27 PID 2044 wrote to memory of 1164 2044 H90490861252¬F.exe 27 PID 2044 wrote to memory of 1164 2044 H90490861252¬F.exe 27 PID 1164 wrote to memory of 464 1164 cmd.exe 29 PID 1164 wrote to memory of 464 1164 cmd.exe 29 PID 1164 wrote to memory of 464 1164 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\H90490861252¬F.exe"C:\Users\Admin\AppData\Local\Temp\H90490861252¬F.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\oTTVRU.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\system32\cscript.execscript C:\Users\Admin\AppData\Local\Temp\nJ.vbs3⤵
- Drops startup file
PID:464
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251B
MD53763ca904ac935fb06ab14a2e09c3798
SHA1af41904eaba3720c4195a0cc989327665a78adea
SHA2561f59dfbba72204da67469785ef05e3f456efcad273719d8b768d0fac2cb17b6c
SHA512b8f8fb3275fa9f45bde7945cfbc22dc0a5c817f7476b2eb311d2b84e3da5b82ce46a18c1eca5b8d8607fb6d5bc7d29608019a838bc1c5ce2d5f8d9399bb3ed35
-
Filesize
540B
MD5def289256104a31e53c3b444290f10cf
SHA11bc8f1c41ba13ce8ae27e58ba421ec05bd00f909
SHA256805f02adba33c29e494d61d9b811f54f9ad8ecbbf9a528499a85b16e868749c4
SHA5127ff8bd1b416ff1bd40689472b5603ae7c0a6e9777d72e641ec4751eafbd9da7ffe9f2669723fe6ec1498fcf352710415c95bf508045cd75cc82b2233a930b60b