Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07-10-2023 02:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
General
-
Target
3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe
-
Size
252KB
-
MD5
9452dff09397314ab6dc4c685e6c8f02
-
SHA1
3374e1886a0992cc147ae1d0005ee387b3840354
-
SHA256
3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c
-
SHA512
f9cde18bba746fa189ba9a4f995707f802d934550606905dc54420cbaff66268db61b63c57a0891d63040d95eee663b424ae472721474ec15e541b66c7f97c19
-
SSDEEP
3072:bwd998ZfNKx2bdV4VUVAMmoymL0qMA6wcyN7cQZzi0oeH5NrM0:C98KwbXV3moymJMGNtcQZz5vr
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Deletes itself 1 IoCs
pid Process 2472 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2696 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2748 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 31 PID 2980 wrote to memory of 2748 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 31 PID 2980 wrote to memory of 2748 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 31 PID 2980 wrote to memory of 2748 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 31 PID 2980 wrote to memory of 2472 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 33 PID 2980 wrote to memory of 2472 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 33 PID 2980 wrote to memory of 2472 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 33 PID 2980 wrote to memory of 2472 2980 3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe 33 PID 2472 wrote to memory of 2696 2472 cmd.exe 35 PID 2472 wrote to memory of 2696 2472 cmd.exe 35 PID 2472 wrote to memory of 2696 2472 cmd.exe 35 PID 2472 wrote to memory of 2696 2472 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe"C:\Users\Admin\AppData\Local\Temp\3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\7271224884.exe"2⤵PID:2748
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "3c384c9d8c7d64f86d8506f713191cd90b83ec734a19137ce86f13067bbc426c.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-