Analysis
-
max time kernel
0s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 03:07
Static task
static1
Behavioral task
behavioral1
Sample
01edcaceaca698cabdca9f9a43ff7a0e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01edcaceaca698cabdca9f9a43ff7a0e.exe
Resource
win10v2004-20231222-en
General
-
Target
01edcaceaca698cabdca9f9a43ff7a0e.exe
-
Size
528KB
-
MD5
01edcaceaca698cabdca9f9a43ff7a0e
-
SHA1
41be85ce5bffe4c5e63ad79ed1eecb457483bca6
-
SHA256
d3ad2ef08ce01b354178d3e1a098e3e5addd98fc4b0fe86d728e5524a4d2b257
-
SHA512
bc301e7925fed61f6ac8fa28e2eef7b90186064a95b53c2c1dddea0beb332e89681624b597c20120cbb2602c6d2f80d092dff0dec5a14c0cd435dc8040849019
-
SSDEEP
12288:+6PiijUm/R+3xGW+VvHgkXsXmKvE/2PnajUT:pKQExGX4IemKM/OajE
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\sppert.ini 01edcaceaca698cabdca9f9a43ff7a0e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\01edcaceaca698cabdca9f9a43ff7a0e.exe"C:\Users\Admin\AppData\Local\Temp\01edcaceaca698cabdca9f9a43ff7a0e.exe"1⤵
- Drops file in Windows directory
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "2⤵PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123B
MD5139b6860a7344b8e0cd8a33e01c7c12e
SHA17df86cbd6fbcb041dad0e44ad256f16f1acf86dd
SHA2563fa86d426da28ebaf47cb7455d94ce22142be9bc0b08c6fa8864c59569eb97d9
SHA5128c60212c6f05fa9f6e2c3ac0ac5bc8859be53ac775b9aeac9d6be06e2f845f712e19c09113a66c2cbf8c5b39db36bd57253648f05487b5369c25d18b37e7e937