Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2023, 19:02

General

  • Target

    2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe

  • Size

    13.8MB

  • MD5

    0f8a23c8d5161d83797f37e682304edd

  • SHA1

    d78c78d935f28c6bc4afc6e39c44a77097160e5d

  • SHA256

    2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2

  • SHA512

    fc30e8d0a88656c5cbc96f489eb0f3863f0afdc149b41c7f7614ac3498910b975d11144f7c38428064cc42764f6e25ba8b2b7143768da9d53c2d6dfcbd4a557e

  • SSDEEP

    393216:aysSKFHl4H+5LBX+YMfSROa75dU69mPQt8vSH6Mlt:dst4H+5VNm8/U6cPQtU43t

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe
    "C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c copy /b C:\Users\Admin\AppData\Local\Temp\쯺èÖ¾MBXr3795.exe + C:\Users\Admin\AppData\Local\Temp\ÐÞ¸ÄÓÃ.txt C:\Users\Admin\AppData\Local\Temp\쯺èÖ¾MBXr3795.exe
      2⤵
        PID:2428

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\쯺èÖ¾MBXr3795.exe

            Filesize

            13.8MB

            MD5

            0f8a23c8d5161d83797f37e682304edd

            SHA1

            d78c78d935f28c6bc4afc6e39c44a77097160e5d

            SHA256

            2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2

            SHA512

            fc30e8d0a88656c5cbc96f489eb0f3863f0afdc149b41c7f7614ac3498910b975d11144f7c38428064cc42764f6e25ba8b2b7143768da9d53c2d6dfcbd4a557e

          • memory/1652-54-0x0000000000400000-0x0000000001A5A000-memory.dmp

            Filesize

            22.4MB

          • memory/1652-55-0x0000000006D60000-0x0000000006EFF000-memory.dmp

            Filesize

            1.6MB

          • memory/1652-61-0x0000000007A20000-0x0000000007A21000-memory.dmp

            Filesize

            4KB

          • memory/1652-63-0x0000000006D60000-0x0000000006EFF000-memory.dmp

            Filesize

            1.6MB

          • memory/1652-62-0x0000000000400000-0x0000000001A5A000-memory.dmp

            Filesize

            22.4MB