Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 10:03

General

  • Target

    65c70dc658d897e89856f75232d61131.exe

  • Size

    93KB

  • MD5

    65c70dc658d897e89856f75232d61131

  • SHA1

    a0800da268ba1b6fa861e008e93279ac0a3aad87

  • SHA256

    5f46f3d235768f80a225b64e37bfe653967c34e2bc061eea2ecd21ef029c0d10

  • SHA512

    13774817839204a7ae9abb1b39279153d497694fc45a8af43d7b7438e42834a9ac6aa9c68f8f14f5f24b3beb6126a25f1979fd636aba995f19683ac29dffec76

  • SSDEEP

    1536:ZyQT05QG70AQz6CwvonnZfr0od8yQoAX2D357dGweFrBNo8DirUrlFIy:TZD0o3A2lZirztrlFIy

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65c70dc658d897e89856f75232d61131.exe
    "C:\Users\Admin\AppData\Local\Temp\65c70dc658d897e89856f75232d61131.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Mbb..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Mbb..bat

    Filesize

    210B

    MD5

    3cc637f67b7a17e8d06c618967578359

    SHA1

    8b95f13d4b3a6e087ea5f388e3b0230be081d169

    SHA256

    be7430fc6104f05b65b8d749acda0fc858eb550efdaa6d7320ccdcc2a365ae0d

    SHA512

    ddb94aa551aa0d24891183bcd6e971977d2a659796ce1e0f8cd0abba24bf322ce6260031830064f58798a0eb420d16c438a5e505befe9d8bbbd952e6d9b6ac82

  • memory/2976-2-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2976-1-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2976-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2976-3-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2976-5-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB