Analysis
-
max time kernel
119s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 17:37
Static task
static1
Behavioral task
behavioral1
Sample
316fe4ad5218427be12478ce966baf1c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
316fe4ad5218427be12478ce966baf1c.exe
Resource
win10v2004-20231215-en
General
-
Target
316fe4ad5218427be12478ce966baf1c.exe
-
Size
93KB
-
MD5
316fe4ad5218427be12478ce966baf1c
-
SHA1
1a9737439eee9101da27a198eeebd0b99387e530
-
SHA256
7230d5137ce6a1bb4bced19d69b194bbfee2289c466c2c767e4facf4e23ee6e7
-
SHA512
6fdff65af203f61cf9655a0d0b740312a2e010ef283c1e564a83c103f7ecea83af8556110ef61eb48557ad11777fbf818c6d2aa3e381573b704a0ecefb7aa5a2
-
SSDEEP
1536:xyQT05QG70AQz6CwvonnZfr0od8yQoAX2D357dGweFrBNo8DirUrlFIy:7ZD0o3A2lZirztrlFIy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2752 2516 316fe4ad5218427be12478ce966baf1c.exe 27 PID 2516 wrote to memory of 2752 2516 316fe4ad5218427be12478ce966baf1c.exe 27 PID 2516 wrote to memory of 2752 2516 316fe4ad5218427be12478ce966baf1c.exe 27 PID 2516 wrote to memory of 2752 2516 316fe4ad5218427be12478ce966baf1c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\316fe4ad5218427be12478ce966baf1c.exe"C:\Users\Admin\AppData\Local\Temp\316fe4ad5218427be12478ce966baf1c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Jwp..bat" > nul 2> nul2⤵
- Deletes itself
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5afbde7765b3019448e2ed97343b6e85d
SHA168f22500ad74855a994d54aa7642b50cbbcdc5b6
SHA256913466fa8e49bc5784769af93f44e0c3411b0ddcbc1272099e112b409f701181
SHA512ccafa2f6a830ccb21157a15e19cb896219d0a90827101c8d8bf179a5311182731725242a8f3aa58db2729bbd1ce54d48fbb68c918d9b258b9867556ddc293a82