Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 12:33
Behavioral task
behavioral1
Sample
a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe
Resource
win10v2004-20230703-en
General
-
Target
a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe
-
Size
246KB
-
MD5
b8af7b2cbdda1d28d1f816698422f740
-
SHA1
a0cbdfc6232e666b069db2b4c28579ac7539a231
-
SHA256
a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd
-
SHA512
68ae5964d444e90807c471bfb552488b89bd3b77baa7e1509c6a416c304eab5d97ab6e5c0c2dc63497ee7412855a94880fad0e2259decf315264572fa202c04f
-
SSDEEP
6144:iMooVQnnOBccnskYPmTpUxrr1XRA7WHxWoN+J0EafCUSYibN6WGm:dQnO/s1mTpG5bUo4bafVibvz
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1600-134-0x0000000000400000-0x0000000001C5B000-memory.dmp upx behavioral2/memory/1600-135-0x0000000000400000-0x0000000001C5B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2820 systeminfo.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1876 PING.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1600 wrote to memory of 4368 1600 a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe 83 PID 1600 wrote to memory of 4368 1600 a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe 83 PID 1600 wrote to memory of 4368 1600 a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe 83 PID 4368 wrote to memory of 2820 4368 cmd.exe 85 PID 4368 wrote to memory of 2820 4368 cmd.exe 85 PID 4368 wrote to memory of 2820 4368 cmd.exe 85 PID 4368 wrote to memory of 1876 4368 cmd.exe 91 PID 4368 wrote to memory of 1876 4368 cmd.exe 91 PID 4368 wrote to memory of 1876 4368 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe"C:\Users\Admin\AppData\Local\Temp\a10124b645e663c7abd7bcbe8373b8e11c69bb2ab2cf1fad78417a15b7f54dbd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c systeminfo>>C:\Windows\temp\setup_gitlog.txt&ping 8.8.8.8>>C:\Windows\temp\setup_gitlog.txt2⤵
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2820
-
-
C:\Windows\SysWOW64\PING.EXEping 8.8.8.83⤵
- Runs ping.exe
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5346bbdef8e66561ce4c33013160d7c75
SHA1023e40d5eb04b2d7e8346ea0c9a62b05d372abec
SHA256ce357dc9d96cbb6933f7895d5fee9052b72733c2db9fc32b1555761b1bd0c277
SHA512f2fd0412846455ee0f47f9e88192ea4c6ee60c3118be40a44c9b626566652ed46b1c3a0708a7ec6feba7a9cafc61091a2a1c6cb864a99a081bb842625040594f