Analysis
-
max time kernel
122s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 04:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f8d48f85213d887e26593cbf8289bbea.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
f8d48f85213d887e26593cbf8289bbea.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
f8d48f85213d887e26593cbf8289bbea.exe
-
Size
338KB
-
MD5
f8d48f85213d887e26593cbf8289bbea
-
SHA1
033a2268f2d5c0cfe36b0b349c625755e1df54d4
-
SHA256
a82cff6bab731179fbc7be78fccab6bbf690aef5978b0ea489840b2e10fc3df5
-
SHA512
c88bbde4590383932485dc1fa1d09302d58138c58baeed858fee54fd978184921ae65ef822f4781dd52f44716b3715705f3778bfca03fe1d7b577b790bd5d2ed
-
SSDEEP
6144:iew5vMsL1OLtun0ZB6rs71LH1i9DZ0yt5:iR1LUd6rw1LHSDq4
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2220 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2216 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2216 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2220 1712 f8d48f85213d887e26593cbf8289bbea.exe 33 PID 1712 wrote to memory of 2220 1712 f8d48f85213d887e26593cbf8289bbea.exe 33 PID 1712 wrote to memory of 2220 1712 f8d48f85213d887e26593cbf8289bbea.exe 33 PID 1712 wrote to memory of 2220 1712 f8d48f85213d887e26593cbf8289bbea.exe 33 PID 2220 wrote to memory of 2216 2220 cmd.exe 35 PID 2220 wrote to memory of 2216 2220 cmd.exe 35 PID 2220 wrote to memory of 2216 2220 cmd.exe 35 PID 2220 wrote to memory of 2216 2220 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8d48f85213d887e26593cbf8289bbea.exe"C:\Users\Admin\AppData\Local\Temp\f8d48f85213d887e26593cbf8289bbea.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "f8d48f85213d887e26593cbf8289bbea.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\f8d48f85213d887e26593cbf8289bbea.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "f8d48f85213d887e26593cbf8289bbea.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-