Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe
Resource
win10v2004-20230703-en
General
-
Target
2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe
-
Size
13.8MB
-
MD5
0f8a23c8d5161d83797f37e682304edd
-
SHA1
d78c78d935f28c6bc4afc6e39c44a77097160e5d
-
SHA256
2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2
-
SHA512
fc30e8d0a88656c5cbc96f489eb0f3863f0afdc149b41c7f7614ac3498910b975d11144f7c38428064cc42764f6e25ba8b2b7143768da9d53c2d6dfcbd4a557e
-
SSDEEP
393216:aysSKFHl4H+5LBX+YMfSROa75dU69mPQt8vSH6Mlt:dst4H+5VNm8/U6cPQtU43t
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1396 2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1396 2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1396 wrote to memory of 2236 1396 2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe 84 PID 1396 wrote to memory of 2236 1396 2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe 84 PID 1396 wrote to memory of 2236 1396 2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe"C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\cmd.execmd /c copy /b C:\Users\Admin\AppData\Local\Temp\ÄþÈñÔóMHRah9922.exe + C:\Users\Admin\AppData\Local\Temp\ÐÞ¸ÄÓÃ.txt C:\Users\Admin\AppData\Local\Temp\ÄþÈñÔóMHRah9922.exe2⤵PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.8MB
MD565700d9c246ae5e2cfbcb0e84c158e10
SHA1c2bd0584712402689d57a1bb24683e96aa9834d3
SHA256bfb8bcbdc684c6cc0cfdda2e80a7c8d52c374c6e01d26ad2c20707200fecec7b
SHA5120e44dfc582b1f1f041a48ea90d4c1e6549a914f570f4b5a4262004a5472ee161e15f196f8705718cfe97f4076b7ea89031788983c9f0b9a49fd4e4cc584e38b3
-
Filesize
3B
MD56e2713a6efee97bacb63e52c54f0ada0
SHA1859371c78674de37bb9ae20743117bad002716e1
SHA2565fbc314fb0b511345465b5b907ec6961328e5e393ff831c8d74912184098bf41
SHA51271095ca02f2cd854850294a5525798175361c75695cf41148804e687b6db1a66a7b3a658c37ef32491721cc80e1caa07f4c20e3e05be29b529d1f22c1b8c419b