Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 02:12
Static task
static1
Behavioral task
behavioral1
Sample
d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe
Resource
win10v2004-20230915-en
General
-
Target
d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe
-
Size
278KB
-
MD5
b85a53b6773a1ea832959b073476faae
-
SHA1
15d02249b51343aeef254190a239999dabbd279a
-
SHA256
d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95
-
SHA512
63233db005ecd0c121f3aeda89504c5e9effc84f9b7a7546aab34ebf24fe1b2c475547e7475a2183ee78d6edbd8dae2d574a9aca6886bd5fdb29a5c6d3a78525
-
SSDEEP
6144:BzeAnePagfufT0HCeqJLVSPMh7e/9g3rA9LP60tHC:BZncagmfn2g7qy8NrHC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2872 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1220 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 29 PID 2008 wrote to memory of 1220 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 29 PID 2008 wrote to memory of 1220 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 29 PID 2008 wrote to memory of 1220 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 29 PID 2008 wrote to memory of 2912 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 32 PID 2008 wrote to memory of 2912 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 32 PID 2008 wrote to memory of 2912 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 32 PID 2008 wrote to memory of 2912 2008 d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe 32 PID 2912 wrote to memory of 2872 2912 cmd.exe 34 PID 2912 wrote to memory of 2872 2912 cmd.exe 34 PID 2912 wrote to memory of 2872 2912 cmd.exe 34 PID 2912 wrote to memory of 2872 2912 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe"C:\Users\Admin\AppData\Local\Temp\d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\1604310509.exe"2⤵PID:1220
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "d37b53f23353eede338e7d30afadc73cd4ca9e1f010367925e70502c4c27bd95.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-