Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 15:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d3c5b425a0e346af5bd572bbc238ccba.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
d3c5b425a0e346af5bd572bbc238ccba.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
d3c5b425a0e346af5bd572bbc238ccba.exe
-
Size
1.8MB
-
MD5
d3c5b425a0e346af5bd572bbc238ccba
-
SHA1
347b3921b0660986bc0ce4d1a41aa77f04377a37
-
SHA256
325ecd90ce19dd8d184ffe7dfb01b0dd02a77e9eabcb587f3738bcfbd3f832a1
-
SHA512
b1734c9eec4de9abbc31f298fa87b22805f1abc09fe2912969ae8644d900ebbe78d269fe0f4851f3bda62f27ce2c63b3ee454ae405e248bb06182183d2abdac7
-
SSDEEP
24576:hM1fTF/NfFqf6r7LVhpPZxT1xtbzBHf8LAeqfk:hM1h+uhXpk
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2760 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2760 powershell.exe 2760 powershell.exe 2760 powershell.exe 2760 powershell.exe 2760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2760 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2760 2184 d3c5b425a0e346af5bd572bbc238ccba.exe 29 PID 2184 wrote to memory of 2760 2184 d3c5b425a0e346af5bd572bbc238ccba.exe 29 PID 2184 wrote to memory of 2760 2184 d3c5b425a0e346af5bd572bbc238ccba.exe 29 PID 2184 wrote to memory of 2760 2184 d3c5b425a0e346af5bd572bbc238ccba.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c5b425a0e346af5bd572bbc238ccba.exe"C:\Users\Admin\AppData\Local\Temp\d3c5b425a0e346af5bd572bbc238ccba.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -C $path = 'C:\Users\Admin\AppData\Local\Temp\d3c5b425a0e346af5bd572bbc238ccba.exe';Get-Process | Where-Object {$_.Path -like $path} | Stop-Process -Force;[byte[]]$arr = new-object byte[] 65536;Set-Content -Path $path -Value $arr;Remove-Item -Path $path;2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-