Analysis
-
max time kernel
118s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 16:30
Static task
static1
Behavioral task
behavioral1
Sample
05ceea70089e649666acdbe3cc9c319f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05ceea70089e649666acdbe3cc9c319f.exe
Resource
win10v2004-20231215-en
General
-
Target
05ceea70089e649666acdbe3cc9c319f.exe
-
Size
63KB
-
MD5
05ceea70089e649666acdbe3cc9c319f
-
SHA1
d6f0097a677abed0b7764166a27592ceb2fa1df3
-
SHA256
44bdbbbe56991ded4603ad80f5783953bf90148ab9a4c88e269b4df08f966e02
-
SHA512
fc7e4fba4cf57dce7a266c3de5f3e734dbd2c5f3c9a2ee57418859246d658f09e61bd7d80e34bdfd69f1af6e3a8587bbe22e69e0b6838cdd2800ce6a6570117b
-
SSDEEP
1536:uufg6xNUQs0ZEjMPcqHmbBhvI1qWfiuv7tPS0xLDfk:x3xNvaIPk+qWpL1fk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2340 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2340 2656 05ceea70089e649666acdbe3cc9c319f.exe 29 PID 2656 wrote to memory of 2340 2656 05ceea70089e649666acdbe3cc9c319f.exe 29 PID 2656 wrote to memory of 2340 2656 05ceea70089e649666acdbe3cc9c319f.exe 29 PID 2656 wrote to memory of 2340 2656 05ceea70089e649666acdbe3cc9c319f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\05ceea70089e649666acdbe3cc9c319f.exe"C:\Users\Admin\AppData\Local\Temp\05ceea70089e649666acdbe3cc9c319f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ubf..bat" > nul 2> nul2⤵
- Deletes itself
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD54e72515d557f255159a720453122a40c
SHA1564e967243034a06b0e4b200bae0b0da8113e665
SHA2565e07b6e7e1dc714a5fa892c23af18d84f4a482dd9adfd619e83eb879c8bd3e4c
SHA51276ecc7e317a4318ed236b019d628f8e558663fc573423973a0898c06d216bb7bf7b1b71f1b22bd85baf49570674b818caa8982dee076a5b43c2cebf68c824790