Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
08/10/2023, 00:31
Behavioral task
behavioral1
Sample
49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe
Resource
win7-20230831-en
9 signatures
150 seconds
General
-
Target
49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe
-
Size
14.0MB
-
MD5
a450ee89273cbdcebdf17236921f23c3
-
SHA1
a2847a809722e92e55a01fd4c92199a0b2967f4c
-
SHA256
49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74
-
SHA512
efec75f2376b902b066bff89d16c330978368de2b0e766506a99b9f60ab83f0968a039e5e4a8a9f652a067431f0382355dbaa0631a4f637422cbdca3fb53a4d4
-
SSDEEP
393216:ACqIuAHiDG4Nd6N7H1ZXnfAGsXUnGfBvgufmKrCG6:ACqlAHifd6XmXUGZvgu+G6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2828 cmd.exe -
resource yara_rule behavioral1/memory/3028-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-74-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-77-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-80-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-83-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-86-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-89-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-92-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-94-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-96-0x0000000002220000-0x0000000002246000-memory.dmp upx behavioral1/memory/3028-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-99-0x0000000002250000-0x0000000002276000-memory.dmp upx behavioral1/memory/3028-100-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/3028-101-0x0000000002220000-0x0000000002246000-memory.dmp upx behavioral1/memory/3028-102-0x0000000002250000-0x0000000002276000-memory.dmp upx behavioral1/memory/3028-105-0x0000000002220000-0x0000000002246000-memory.dmp upx behavioral1/memory/3028-106-0x0000000002250000-0x0000000002276000-memory.dmp upx -
resource yara_rule behavioral1/memory/3028-5-0x0000000000400000-0x0000000001DD7000-memory.dmp vmprotect behavioral1/memory/3028-53-0x0000000000400000-0x0000000001DD7000-memory.dmp vmprotect behavioral1/memory/3028-104-0x0000000000400000-0x0000000001DD7000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1488 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2828 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 30 PID 3028 wrote to memory of 2828 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 30 PID 3028 wrote to memory of 2828 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 30 PID 3028 wrote to memory of 2828 3028 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 30 PID 2828 wrote to memory of 1488 2828 cmd.exe 32 PID 2828 wrote to memory of 1488 2828 cmd.exe 32 PID 2828 wrote to memory of 1488 2828 cmd.exe 32 PID 2828 wrote to memory of 1488 2828 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe"C:\Users\Admin\AppData\Local\Temp\49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 &del "C:\Users\Admin\AppData\Local\Temp\49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1488
-
-