Analysis

  • max time kernel
    1s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 05:00

General

  • Target

    6bf29107ceab9ce8db30c1276995030f.exe

  • Size

    36KB

  • MD5

    6bf29107ceab9ce8db30c1276995030f

  • SHA1

    1925cb10161216ae58e11e0f0f8d458e134bbad0

  • SHA256

    185eee5d2b5295185f1e5ec11cb889f4b134d54cca911751ca5f291183e8d86d

  • SHA512

    ddfbe9b3a98bd78fe6aeea85e920f113843cf84ed583c93f2de478db5c95a61c004eabf219c1ca501d594b27719ec388fbd8f49d1749a085a07d3c0e1ef182ba

  • SSDEEP

    384:TivFsccfFOXJBbqvVHd13Djs64xHaLxr+e+zmiLPR86pf0ZAY99xSR:SscqO5BIZDyxHa9r+e+asvpfUAU9xS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bf29107ceab9ce8db30c1276995030f.exe
    "C:\Users\Admin\AppData\Local\Temp\6bf29107ceab9ce8db30c1276995030f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\6bf29107ceab9ce8db30c1276995030f.rtf"
      2⤵
        PID:1272
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          3⤵
            PID:2796

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\6bf29107ceab9ce8db30c1276995030f.rtf

              Filesize

              4KB

              MD5

              cce1ee2eca38ec5cca3a1dc883ca815e

              SHA1

              447b3209541feb29aef0e8150367f1e9d4777ed5

              SHA256

              d44903105c844b08ebe0822d97c64fb70e7da14fb327ae3a2cad4059d4e10d98

              SHA512

              514b4bce268ddc79696334fae0dc642a97c2582b80648c1ffcd347beed2c70789f7f690eab8c4ed1398492bd1d8edf3e46cff38e22340130fc52d76943583acd

            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

              Filesize

              20KB

              MD5

              9641b3f0e6ceac4f749cbafcbbc551bf

              SHA1

              1b2136eca21244ce69b210fdeae49d08ffd0ad36

              SHA256

              34947dd6f1cfd383e6bf498beeaa18a46c0dafe03e761cd381c0405ae8ec6a76

              SHA512

              6b5ea72368708685c8b73ea4a93a7eaa205fcaf6c8c306d0d868ac80f30917317ca1c910af4553df759a73f584b84cf360cb2b1d29b66f48fededfc1042ee924

            • memory/860-0-0x0000000000260000-0x0000000000261000-memory.dmp

              Filesize

              4KB

            • memory/860-3-0x0000000000280000-0x0000000000281000-memory.dmp

              Filesize

              4KB

            • memory/860-2-0x0000000000400000-0x000000000040C000-memory.dmp

              Filesize

              48KB

            • memory/1272-7-0x000000002FFF1000-0x000000002FFF2000-memory.dmp

              Filesize

              4KB

            • memory/1272-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB

            • memory/1272-9-0x00000000710FD000-0x0000000071108000-memory.dmp

              Filesize

              44KB

            • memory/1272-21-0x00000000710FD000-0x0000000071108000-memory.dmp

              Filesize

              44KB

            • memory/1272-46-0x000000005FFF0000-0x0000000060000000-memory.dmp

              Filesize

              64KB