Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 08:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
74b2d6fb1c1f8429468cb315918ee7f6.exe
Resource
win7-20230831-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
74b2d6fb1c1f8429468cb315918ee7f6.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
74b2d6fb1c1f8429468cb315918ee7f6.exe
-
Size
252KB
-
MD5
74b2d6fb1c1f8429468cb315918ee7f6
-
SHA1
5fae12c58852cead4403af10fc6affa153f4900c
-
SHA256
c1914894e6e67a643e782c48a06ce290c5e42f3fff52862cee6ca41a683d61ac
-
SHA512
296973166f94a06da0133ead909ebbcf773a541540195c7f15ec9ca1f7bbb653dfd21500b37fd86bab68dac747b68a99cc10f3113c82e0183e6ae85364a4e64f
-
SSDEEP
3072:5wAY+tL0x1TexR18l5eWQ462G7rNEUYy4oco140Lx9tiuFbwEVs9HzC5fa5j8E+:S+6de7X467nEy737ASbwEzU
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2668 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2816 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2668 2152 74b2d6fb1c1f8429468cb315918ee7f6.exe 29 PID 2152 wrote to memory of 2668 2152 74b2d6fb1c1f8429468cb315918ee7f6.exe 29 PID 2152 wrote to memory of 2668 2152 74b2d6fb1c1f8429468cb315918ee7f6.exe 29 PID 2152 wrote to memory of 2668 2152 74b2d6fb1c1f8429468cb315918ee7f6.exe 29 PID 2668 wrote to memory of 2816 2668 cmd.exe 31 PID 2668 wrote to memory of 2816 2668 cmd.exe 31 PID 2668 wrote to memory of 2816 2668 cmd.exe 31 PID 2668 wrote to memory of 2816 2668 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\74b2d6fb1c1f8429468cb315918ee7f6.exe"C:\Users\Admin\AppData\Local\Temp\74b2d6fb1c1f8429468cb315918ee7f6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "74b2d6fb1c1f8429468cb315918ee7f6.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\74b2d6fb1c1f8429468cb315918ee7f6.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "74b2d6fb1c1f8429468cb315918ee7f6.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-