Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
06506a33b14f58ef9c29a688c6b9f67f.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06506a33b14f58ef9c29a688c6b9f67f.exe
Resource
win10v2004-20231215-en
General
-
Target
06506a33b14f58ef9c29a688c6b9f67f.exe
-
Size
155KB
-
MD5
06506a33b14f58ef9c29a688c6b9f67f
-
SHA1
2884d79db4c9580b4160ea47ceee678b7582972c
-
SHA256
75fd6b0331e47564a0f71d0adea87a07ac55462f7955df3b5b91caea6c59983b
-
SHA512
e0602f0d2c8abf1aecaeaabfb8423c4ff5742f7b9510b7704c710f71e0e62f1538dfc326ab58776b67dddedb79db5b26304f84fb7291242f4924a3c405b57727
-
SSDEEP
3072:/uv2RLe0Py9jCngy7xA6gJNQqMuvNYD/5SnQ+drVe2TGyMW2+8G5ojviuSct:/qCg9jUdeJNkqLQ2bxl5ojv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1856 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1856 1680 06506a33b14f58ef9c29a688c6b9f67f.exe 28 PID 1680 wrote to memory of 1856 1680 06506a33b14f58ef9c29a688c6b9f67f.exe 28 PID 1680 wrote to memory of 1856 1680 06506a33b14f58ef9c29a688c6b9f67f.exe 28 PID 1680 wrote to memory of 1856 1680 06506a33b14f58ef9c29a688c6b9f67f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\06506a33b14f58ef9c29a688c6b9f67f.exe"C:\Users\Admin\AppData\Local\Temp\06506a33b14f58ef9c29a688c6b9f67f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Oxp..bat" > nul 2> nul2⤵
- Deletes itself
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD507b8bdce40e4acce4e56782ecd873dcb
SHA1f1b3fb0bcef7899fba19568e635164f8c241e18f
SHA2563c9fcac6ffaa722ad1a7a1d415e65b6046cad79a4a21ad17a5d516997d952912
SHA512f0bfed08db3ab2ac055ac4637971206d83211fd394c2551935be68b3de327cd11c34cfbb7caee3c4e052af7b64f0eb993b518040567c5efd0f7827a4498ff402