Analysis
-
max time kernel
117s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 01:10
Static task
static1
Behavioral task
behavioral1
Sample
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe
Resource
win10v2004-20230915-en
General
-
Target
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe
-
Size
381KB
-
MD5
a3d480ba00137202a96d1fe4d563d552
-
SHA1
e528412dc45db42f1c630f4644b46a8377974e2c
-
SHA256
bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae
-
SHA512
8a44a80af2ef6ba170a8ff4a91414ba56e264497ee87d7a56f65e2039fe15075d030530556b83f9448f06ee0393314c6c90fb5164f936a3fe003f6f392cd6673
-
SSDEEP
6144:balupTHjhG7pgQZzMeUBusOtQvMkM2U5ruSQPc1YdQ2CpUtB5:eYTHdypgQBMeUK35ruJEKdnsk/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2856 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2464 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2464 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2856 1964 bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe 33 PID 1964 wrote to memory of 2856 1964 bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe 33 PID 1964 wrote to memory of 2856 1964 bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe 33 PID 1964 wrote to memory of 2856 1964 bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe 33 PID 2856 wrote to memory of 2464 2856 cmd.exe 35 PID 2856 wrote to memory of 2464 2856 cmd.exe 35 PID 2856 wrote to memory of 2464 2856 cmd.exe 35 PID 2856 wrote to memory of 2464 2856 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe"C:\Users\Admin\AppData\Local\Temp\bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "bc8a042d1b77efec281dcc1f7653165e2e8218e6ef0dc225571aef6c664a73ae.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-