Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
05-07-2023 19:34
Static task
static1
Behavioral task
behavioral1
Sample
f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe
Resource
win10v2004-20230703-en
General
-
Target
f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe
-
Size
1.9MB
-
MD5
b1652f2b4cd5bdc366e751dee52a073e
-
SHA1
c6014e156e0abba8e31d4683c49f5ba2e3f0732a
-
SHA256
f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a
-
SHA512
52d0e9a16484301d0c805cd124625f4903cd0fd6d8f6eb23e195e4a8abe28fa65d512b4c382216144d20dd9b5bc776c231f68cda69359effc0c71e673a0e97c5
-
SSDEEP
24576:UW6VXRhhnzyhPIVcz9XUIRmQpLKcxafX0djRbEcPQ5Aeax+q4GZSKSnB3kqA9yoY:p6zyhPIaJXRmQZAXCjfwB4QKSnBUFmtT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3056 wrote to memory of 908 3056 f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe 28 PID 3056 wrote to memory of 908 3056 f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe 28 PID 3056 wrote to memory of 908 3056 f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe 28 PID 3056 wrote to memory of 908 3056 f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe 28 PID 908 wrote to memory of 1684 908 cmd.exe 30 PID 908 wrote to memory of 1684 908 cmd.exe 30 PID 908 wrote to memory of 1684 908 cmd.exe 30 PID 908 wrote to memory of 1684 908 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe"C:\Users\Admin\AppData\Local\Temp\f7bf20885774e44212aafb6fe28e0f08899c7647ef345d83efc978044289877a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\工具条设置.bat" /工具条设置.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\mode.commode con cols=60 lines=163⤵PID:1684
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285B
MD51782b3575feec9e9ef09b22cfe53ba48
SHA181b7de2cb701c42a3c4b49779e48cebdcef90202
SHA25617bd2e2c5fe7d7d960885fff27af03bea6edd9a368bbb08a8170dc822d843af2
SHA51253ef8036dfc10a68548a2258ac925b59e56321ffa87f35ae728eea66471fce6ceecf6231f566863fb1e692c1fc7d4320406e8dafd8bc27bcffbe96768c55fc59
-
Filesize
285B
MD51782b3575feec9e9ef09b22cfe53ba48
SHA181b7de2cb701c42a3c4b49779e48cebdcef90202
SHA25617bd2e2c5fe7d7d960885fff27af03bea6edd9a368bbb08a8170dc822d843af2
SHA51253ef8036dfc10a68548a2258ac925b59e56321ffa87f35ae728eea66471fce6ceecf6231f566863fb1e692c1fc7d4320406e8dafd8bc27bcffbe96768c55fc59