Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 08:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe
-
Size
236KB
-
MD5
5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3
-
SHA1
110ffc5adf2668d36c1fd3476cdd45bcce2404e9
-
SHA256
9d750d54f89d2b90adeac5285796a1c25d88b7c5efba8fc156187e81aea9c644
-
SHA512
9ec51fb87d3e7bc4bb22888fd8033cbffa269bbac8dad1deec6ce094e2b8ff09e95ce152c44fd1ff8858f23d6d25ceb0e528b31c6fca75d9d221e757c3266493
-
SSDEEP
3072:YZ5bDdTMuc++sK5mq/cFZX7hkeY2Zgt5/Aw4Yh4eV8o68leY:YZxDdT++zK5mfPXDFsSQ8o6f
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2092 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2092 2024 5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe 28 PID 2024 wrote to memory of 2092 2024 5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe 28 PID 2024 wrote to memory of 2092 2024 5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe 28 PID 2024 wrote to memory of 2092 2024 5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe 28 PID 2024 wrote to memory of 2092 2024 5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe 28 PID 2024 wrote to memory of 2092 2024 5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe 28 PID 2024 wrote to memory of 2092 2024 5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe"C:\Users\Admin\AppData\Local\Temp\5e8dee1ba0b8a0ce3a3d4b7c3bfac6d3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Tzp..bat" > nul 2> nul2⤵
- Deletes itself
PID:2092
-