Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 06:02
Static task
static1
Behavioral task
behavioral1
Sample
0a1ac8ee4c636e91a7240390d632f995.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a1ac8ee4c636e91a7240390d632f995.exe
Resource
win10v2004-20231215-en
General
-
Target
0a1ac8ee4c636e91a7240390d632f995.exe
-
Size
105KB
-
MD5
0a1ac8ee4c636e91a7240390d632f995
-
SHA1
f60d7be7757aeb2aad8fb4450e1002056d3bc03a
-
SHA256
05f19ca69aca49cfd2a0618352af5f3740cbf924631754479a194037ec2ffc3a
-
SHA512
9e13d3d6895145f258bae711f5f57368460ed70cc7734c8d7d6ae456927f6a6fda1c394e4e52040a93de75816ab8f5a45adb0d1d5187221b233b9fc5713f7ef2
-
SSDEEP
1536:0D5SHxkxBS7tY437+8zkSffyTATZWyjU9OpJdGCLSbPDgg3GYcMRSj:0tSRkxg7JCSX0EZW1KJ3CDLPR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 852 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 852 2212 0a1ac8ee4c636e91a7240390d632f995.exe 28 PID 2212 wrote to memory of 852 2212 0a1ac8ee4c636e91a7240390d632f995.exe 28 PID 2212 wrote to memory of 852 2212 0a1ac8ee4c636e91a7240390d632f995.exe 28 PID 2212 wrote to memory of 852 2212 0a1ac8ee4c636e91a7240390d632f995.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a1ac8ee4c636e91a7240390d632f995.exe"C:\Users\Admin\AppData\Local\Temp\0a1ac8ee4c636e91a7240390d632f995.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mgf..bat" > nul 2> nul2⤵
- Deletes itself
PID:852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD55b5612c3026c9441edeae9b78f9eef25
SHA1db7b6120731dd894b0c85b22b83b671f284f6c12
SHA2567a92895898aad279f5951e2b8015b41d8e3df6034bb4ed0a81e307b0e516f62b
SHA512f454bc2de81c41dda2a136cabf7133996d3f1a620025f90f3c465a108c1412ed47347a98df6c0cdce946cfb9963b6aabc353b921b637d6d0df36d3cb9de4d377