Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2023 20:48

General

  • Target

    11e5d7fd0d0efdc03d8ffdfa1e8a8d7a.exe

  • Size

    144KB

  • MD5

    11e5d7fd0d0efdc03d8ffdfa1e8a8d7a

  • SHA1

    1bc9c8677edebe9c2af6bb7c23ead3cf6aa3e8a2

  • SHA256

    4ca95db08dcad88aa38bf29a3d0c8b315fdb1331953e84f015846f68fd6b9040

  • SHA512

    92bf9fe7abcf241b4c9087d298104c7b9afc2cf7c7e052855737af0baa792645e3b6295b5d07a44c5b4e6de61205ee9381cb0de777458ef3d04ccbedc0121269

  • SSDEEP

    3072:V7GeKlHXSvQ0tRpSFsOTHHrdT+cT3B0DBpq7qZ2o2LlmSbReH:VvsX6HMZHkDBZZ2bLlm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11e5d7fd0d0efdc03d8ffdfa1e8a8d7a.exe
    "C:\Users\Admin\AppData\Local\Temp\11e5d7fd0d0efdc03d8ffdfa1e8a8d7a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Zfz..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Zfz..bat

    Filesize

    210B

    MD5

    67fe5a42009156361f99721172301101

    SHA1

    217627549bbb23f1cdab441bc0ac60f571344daa

    SHA256

    63c519f4a2e77cc04e8d0664330140d37f2b995babf4ededea7ef58b0cb6fb36

    SHA512

    588eb347f4b4028ade3531243ec90104c9528fd9da1a5ad8b0032187e0f9859ccbd26195692823af2f3ebd068dab7a70552b4ee5831a9fe59e2db43e02f667df

  • memory/2416-0-0x0000000000250000-0x000000000027F000-memory.dmp

    Filesize

    188KB

  • memory/2416-1-0x0000000000250000-0x000000000027F000-memory.dmp

    Filesize

    188KB

  • memory/2416-2-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2416-4-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB