Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 09:13
Static task
static1
Behavioral task
behavioral1
Sample
8064cb2d6272e464ae5962292422152c.exe
Resource
win7-20231215-en
General
-
Target
8064cb2d6272e464ae5962292422152c.exe
-
Size
349KB
-
MD5
8064cb2d6272e464ae5962292422152c
-
SHA1
47bad41a2192dc9392e70ce8118d4028b79655fb
-
SHA256
282d2563e428a52e763353b3f2155984f9e0f483d6386300822f8da86f023750
-
SHA512
e2eff22eec6dd9e3aa41d338d0cde642c975c0ee2dfa46f4fe6c9b480306d3ad7af5b87d4758c66877a79e4d6df7c95323d953bf8a8e42078c5c2bab5237de88
-
SSDEEP
6144:48IFCVf+vT9N2g/f4+HYVFn9u53jU4A8llwr9sEpDQC0Ta+:jVWvZcg/N+ni3jUUlwtpD90Ta
Malware Config
Extracted
gootkit
163
api.gallantlystreaming.org
asapgetnode.club
pop3.verihostname.work
-
vendor_id
163
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2720 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8064cb2d6272e464ae5962292422152c.execmd.exedescription pid process target process PID 1516 wrote to memory of 2720 1516 8064cb2d6272e464ae5962292422152c.exe cmd.exe PID 1516 wrote to memory of 2720 1516 8064cb2d6272e464ae5962292422152c.exe cmd.exe PID 1516 wrote to memory of 2720 1516 8064cb2d6272e464ae5962292422152c.exe cmd.exe PID 1516 wrote to memory of 2720 1516 8064cb2d6272e464ae5962292422152c.exe cmd.exe PID 2720 wrote to memory of 2824 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2824 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2824 2720 cmd.exe attrib.exe PID 2720 wrote to memory of 2824 2720 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\8064cb2d6272e464ae5962292422152c.exe"C:\Users\Admin\AppData\Local\Temp\8064cb2d6272e464ae5962292422152c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259414343.bat" "C:\Users\Admin\AppData\Local\Temp\8064cb2d6272e464ae5962292422152c.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2720
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\8064cb2d6272e464ae5962292422152c.exe"1⤵
- Views/modifies file attributes
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD548589d1c664fb45ade0b261f99c95392
SHA1296cb9ac6faac798c5c87e3b1921128bae891eea
SHA256c63258dfa64e40e53714401e3da36dd2576d9c24a032d15f79abad1904b89e07
SHA51232a4f553d78f8b7500775f70d64b9ae3df6d4afd4c8638551bbe45d45e3a9bc43880f5960ac8cef708d6df294875465bdbc2abd3db717de1561071241f45f02b