Analysis
-
max time kernel
835s -
max time network
838s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
17/11/2023, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
ovisetup.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ovisetup.exe
Resource
win10v2004-20231020-en
General
-
Target
ovisetup.exe
-
Size
7KB
-
MD5
30c869f86070bb17506fdc6aeaf84d60
-
SHA1
0cd0309850ea039337e98dd3bf9eef5706de459d
-
SHA256
396de0692dfdb825fb6e982df7350d0517c03ffdf293d8b5b3ca1daae68f8532
-
SHA512
31f0349713e80284dedc9ca8fe712005c4ba592ee2744532e5611c3969c6d4af1ccf63a2ec389b5426f2add0cb68161dd87c0abb2256b7319ab19a0766fdf9af
-
SSDEEP
192:3Le038gJvNdaLix9upSiP/VunlYJLLLTutQH5cqbx:3Le038gzdaLiG3hPLTuKHTb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2672 2400 ovisetup.exe 28 PID 2400 wrote to memory of 2672 2400 ovisetup.exe 28 PID 2400 wrote to memory of 2672 2400 ovisetup.exe 28 PID 2672 wrote to memory of 2852 2672 cmd.exe 30 PID 2672 wrote to memory of 2852 2672 cmd.exe 30 PID 2672 wrote to memory of 2852 2672 cmd.exe 30 PID 2672 wrote to memory of 2700 2672 cmd.exe 31 PID 2672 wrote to memory of 2700 2672 cmd.exe 31 PID 2672 wrote to memory of 2700 2672 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ovisetup.exe"C:\Users\Admin\AppData\Local\Temp\ovisetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msg.vbs"3⤵PID:2852
-
-
C:\Windows\system32\rundll32.exeRUNDLL32 USER32.DLL,SwapMouseButton3⤵PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161B
MD55ef09827bef4aad974e23b11eb0a8067
SHA1a482275ff4638789696dddd8507c0cf4a1e441d4
SHA256f30351b84dce801806c68cdac9b967452fe8abd05ccf3190ba1d9ad025e14c9c
SHA512aa7d1f5315206e7fffeec03c12283b987b4342d670c35bd01c6c283115ecb8525fd4227e8fb49d952ef33badac703a20c5c7683a548c1fa37b5c89ed5d197406
-
Filesize
161B
MD55ef09827bef4aad974e23b11eb0a8067
SHA1a482275ff4638789696dddd8507c0cf4a1e441d4
SHA256f30351b84dce801806c68cdac9b967452fe8abd05ccf3190ba1d9ad025e14c9c
SHA512aa7d1f5315206e7fffeec03c12283b987b4342d670c35bd01c6c283115ecb8525fd4227e8fb49d952ef33badac703a20c5c7683a548c1fa37b5c89ed5d197406
-
Filesize
61B
MD5b06245c484cbf5dde40e2d51f5861e21
SHA1990698a4e3a8a91fb860736a7224e056e39e110b
SHA2561b5f170a8ff16756eb8fa3d6201114aa517ceb99f512a5a2a2005141c17e5102
SHA512760a76d6afd2863f3263cad3508cfa0049914f8b779756104a53de20aa190c6bd7219b840db63a040a7db99a80b94771bb09ecdc89bcbd9285ebda35b33da081