Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
26/08/2023, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20230824-en
General
-
Target
a.exe
-
Size
90KB
-
MD5
be380b0736c5b987396b27623c22c7b9
-
SHA1
dcba1d1e8b72d6c62ef85adbcda7a05d0f13357d
-
SHA256
abc95b87d61de2b46805ee9e536aed85af8a62bcdc43661991d550485d0f1752
-
SHA512
47df3275ad84b9ea08c148695425a4cd45c97945379213bb7c206e36c28ae12c9275869c880e6781b9127847d484fb0c35e1f0045f81edeb2623f1fe535a0c02
-
SSDEEP
1536:T7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIf6xYB0O4:Pq6+ouCpk2mpcWJ0r+QNTBf66Bg
Malware Config
Signatures
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.vbs cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.lnk cscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.vbs attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2120 2912 a.exe 28 PID 2912 wrote to memory of 2120 2912 a.exe 28 PID 2912 wrote to memory of 2120 2912 a.exe 28 PID 2912 wrote to memory of 2120 2912 a.exe 28 PID 2120 wrote to memory of 2560 2120 cmd.exe 30 PID 2120 wrote to memory of 2560 2120 cmd.exe 30 PID 2120 wrote to memory of 2560 2120 cmd.exe 30 PID 2120 wrote to memory of 2376 2120 cmd.exe 31 PID 2120 wrote to memory of 2376 2120 cmd.exe 31 PID 2120 wrote to memory of 2376 2120 cmd.exe 31 PID 2120 wrote to memory of 2400 2120 cmd.exe 32 PID 2120 wrote to memory of 2400 2120 cmd.exe 32 PID 2120 wrote to memory of 2400 2120 cmd.exe 32 PID 2120 wrote to memory of 2492 2120 cmd.exe 33 PID 2120 wrote to memory of 2492 2120 cmd.exe 33 PID 2120 wrote to memory of 2492 2120 cmd.exe 33 PID 2120 wrote to memory of 2512 2120 cmd.exe 34 PID 2120 wrote to memory of 2512 2120 cmd.exe 34 PID 2120 wrote to memory of 2512 2120 cmd.exe 34 PID 2512 wrote to memory of 2056 2512 WScript.exe 35 PID 2512 wrote to memory of 2056 2512 WScript.exe 35 PID 2512 wrote to memory of 2056 2512 WScript.exe 35 -
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2492 attrib.exe 2376 attrib.exe 2400 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BAA8.tmp\BAA9.tmp\BAAA.bat C:\Users\Admin\AppData\Local\Temp\a.exe"2⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\cscript.execscript CreateShortcut.vbs3⤵
- Drops startup file
PID:2560
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Videos\python"3⤵
- Views/modifies file attributes
PID:2376
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.vbs"3⤵
- Drops startup file
- Views/modifies file attributes
PID:2400
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Videos\python\startup.py"3⤵
- Views/modifies file attributes
PID:2492
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\startup.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\Videos\python\python.exe C:\Users\Admin\Videos\python\startup.py4⤵PID:2056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5c05be96260f463759bacbb9174d7f09d
SHA1523cb0711a4e071914ca1cb7e4cee9018b5938d2
SHA2569b532874cbceab6ff2e9e930f9cf1925e4e65905ec3bdb17bd819d128bc8eab2
SHA5125970008392a43cf0562e158bf63596c4411dd862160f8d7aa7a4e64d3c6fdcf0f53057c1988227d5609559e4f8cb7e6d954ba58a479b4aa48d47eb8902a7842b
-
Filesize
170B
MD5dc137970088ee88b88261d572e081056
SHA1cabc47c94ec6ac6f3aeb6f54e4ec3877ddc7fe4f
SHA25629df41e8d7e6de01e863d8fa550b4aaea873f16c399c2a8ebeb9e17760be03d4
SHA5129643d37103e311b9481d2443fb4a6f45ea0c9777fe5a39576eeaa184b599ab1721ab07f2a2c37b283206fb0ec6931f0e45a6633fb8e4155de39d3b02c2e1037a
-
Filesize
324B
MD53ca6a725ce00962db447b91b04b88e11
SHA1ea8703e007aeede2af5cd8ea4139f51ef48103d9
SHA256b1c322e3fa3afc3fda4c2a825d028d7dfc6bf322fa1a78c56b1c547dcff1aa79
SHA51222290ee3a7d75e51c35b1d187df22be6696604f7522323a02811fda0c8e3bec7f3dc61b6d0c8ff66a9f421f27ea04fecb7c170e43e9c671ac930084fbaabae90