Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 06:02

General

  • Target

    0a1ac8ee4c636e91a7240390d632f995.exe

  • Size

    105KB

  • MD5

    0a1ac8ee4c636e91a7240390d632f995

  • SHA1

    f60d7be7757aeb2aad8fb4450e1002056d3bc03a

  • SHA256

    05f19ca69aca49cfd2a0618352af5f3740cbf924631754479a194037ec2ffc3a

  • SHA512

    9e13d3d6895145f258bae711f5f57368460ed70cc7734c8d7d6ae456927f6a6fda1c394e4e52040a93de75816ab8f5a45adb0d1d5187221b233b9fc5713f7ef2

  • SSDEEP

    1536:0D5SHxkxBS7tY437+8zkSffyTATZWyjU9OpJdGCLSbPDgg3GYcMRSj:0tSRkxg7JCSX0EZW1KJ3CDLPR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a1ac8ee4c636e91a7240390d632f995.exe
    "C:\Users\Admin\AppData\Local\Temp\0a1ac8ee4c636e91a7240390d632f995.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mgf..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Mgf..bat

    Filesize

    210B

    MD5

    5b5612c3026c9441edeae9b78f9eef25

    SHA1

    db7b6120731dd894b0c85b22b83b671f284f6c12

    SHA256

    7a92895898aad279f5951e2b8015b41d8e3df6034bb4ed0a81e307b0e516f62b

    SHA512

    f454bc2de81c41dda2a136cabf7133996d3f1a620025f90f3c465a108c1412ed47347a98df6c0cdce946cfb9963b6aabc353b921b637d6d0df36d3cb9de4d377

  • memory/2212-0-0x0000000000230000-0x0000000000249000-memory.dmp

    Filesize

    100KB

  • memory/2212-1-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2212-3-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB