Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
086b3fa9676cfcd9e9abf33ecbde08b6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
086b3fa9676cfcd9e9abf33ecbde08b6.exe
Resource
win10v2004-20231215-en
General
-
Target
086b3fa9676cfcd9e9abf33ecbde08b6.exe
-
Size
84KB
-
MD5
086b3fa9676cfcd9e9abf33ecbde08b6
-
SHA1
9177fa24dba4c08a28f05efd2fb56c547b12bbac
-
SHA256
e22baa7db0e841dc3b4b902bdfc79fd680718ec34729ac52d77417e1b0bc46e8
-
SHA512
390c22baddbcedf3118b341e8b4b855b4a90f8fd590d7527ef6c1380d3657532164134c8df3b1bf9d16ae8f771a04561a90acad998c6cdf8951d1618a33ac3a7
-
SSDEEP
1536:/ypHHE7fhsmHCtt1B0IwaIIPcQ1kbMYgczHPottyGzq:/ypHH3tt1UCkQYnz4O
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Administration = "C:\\Users\\Admin\\AppData\\Roaming\\whitepixel\\Administration.exe" 086b3fa9676cfcd9e9abf33ecbde08b6.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\086b3fa9676cfcd9e9abf33ecbde08b6.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\whitepixel\Administration.exe\:Zone.Identifier:$DATA 086b3fa9676cfcd9e9abf33ecbde08b6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2748 2028 086b3fa9676cfcd9e9abf33ecbde08b6.exe 28 PID 2028 wrote to memory of 2748 2028 086b3fa9676cfcd9e9abf33ecbde08b6.exe 28 PID 2028 wrote to memory of 2748 2028 086b3fa9676cfcd9e9abf33ecbde08b6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\086b3fa9676cfcd9e9abf33ecbde08b6.exe"C:\Users\Admin\AppData\Local\Temp\086b3fa9676cfcd9e9abf33ecbde08b6.exe"1⤵
- Adds Run key to start application
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\cmd.exe"cmd"2⤵
- NTFS ADS
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5086b3fa9676cfcd9e9abf33ecbde08b6
SHA19177fa24dba4c08a28f05efd2fb56c547b12bbac
SHA256e22baa7db0e841dc3b4b902bdfc79fd680718ec34729ac52d77417e1b0bc46e8
SHA512390c22baddbcedf3118b341e8b4b855b4a90f8fd590d7527ef6c1380d3657532164134c8df3b1bf9d16ae8f771a04561a90acad998c6cdf8951d1618a33ac3a7