Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:49
Behavioral task
behavioral1
Sample
cc1c6d7cdd748f5fb55ded263b1438a0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cc1c6d7cdd748f5fb55ded263b1438a0.exe
Resource
win10v2004-20231215-en
General
-
Target
cc1c6d7cdd748f5fb55ded263b1438a0.exe
-
Size
1.8MB
-
MD5
cc1c6d7cdd748f5fb55ded263b1438a0
-
SHA1
4b25d0e410dba5b0e47a336dee24d9a15701506b
-
SHA256
6be9657ff06c2730d657ecf604eac03c324df0284f6aca452268717920de75ca
-
SHA512
02004e995ac2e188e0ef7e73b2fdc6ae49532d6938a86cc8242a511c3d053bd0f78aa80156f7731de4dc88a4cd3f3089db3bce24f79e9eff3c40156e65fa65d5
-
SSDEEP
49152:B3+pFfdjecsxUbtHe3dcTCyZSvQg3sqfKUfEkh:B3EFflsOxe3iTC/pJNE8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2140-0-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral1/memory/2140-23-0x0000000000400000-0x000000000049E000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2140-23-0x0000000000400000-0x000000000049E000-memory.dmp autoit_exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\AdbWinApi.dll cc1c6d7cdd748f5fb55ded263b1438a0.exe File opened for modification C:\Windows\SysWOW64\AdbWinApi.dll cc1c6d7cdd748f5fb55ded263b1438a0.exe File created C:\Windows\SysWOW64\AdbWinUsbApi.dll cc1c6d7cdd748f5fb55ded263b1438a0.exe File opened for modification C:\Windows\SysWOW64\AdbWinUsbApi.dll cc1c6d7cdd748f5fb55ded263b1438a0.exe File created C:\Windows\SysWOW64\adb.exe cc1c6d7cdd748f5fb55ded263b1438a0.exe File opened for modification C:\Windows\SysWOW64\adb.exe cc1c6d7cdd748f5fb55ded263b1438a0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2140 cc1c6d7cdd748f5fb55ded263b1438a0.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD5cb4734d27980d672ff434a39dd04de97
SHA190da7b4838e42488f2cd61d342d699f48fef23c0
SHA25607ff36617f52e710664d03451699a8cc6730ff072ce908e784dcee127a246041
SHA5125309f99ba06d25313c4590714da64fec67edf0d3b8fd9706b94fcbd9ed05d9e2eb3667560eab656ac52108c23efd61b82e971b50ba710c99109f51313d6d684d