Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
6948024ffc0df8f2c08c14fbfb2fb3f5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6948024ffc0df8f2c08c14fbfb2fb3f5.exe
Resource
win10v2004-20231215-en
General
-
Target
6948024ffc0df8f2c08c14fbfb2fb3f5.exe
-
Size
9.3MB
-
MD5
6948024ffc0df8f2c08c14fbfb2fb3f5
-
SHA1
363c3e5756e22f0d779259d3f3923498fe02a3e7
-
SHA256
3f91c55789634db102b514e6b98944345d793ddc157c8665e989674fd489a53e
-
SHA512
ca0ea62b9c2db5e8c4e0cc925d54a612364147b14cc51dede144c9ce0b99391e6ca34e4d26abd70470b54ee7ac1f36bda715dc51d6e98d9e72a4d7eae91df939
-
SSDEEP
49152:Z0NgY7hQ0pL/PHZSAhm8wynmidrfjXAry4kubEnc8bvVbmLDaSCbBBi1/W9KGvha:pg3m
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1748 2240 6948024ffc0df8f2c08c14fbfb2fb3f5.exe 24 PID 2240 wrote to memory of 1748 2240 6948024ffc0df8f2c08c14fbfb2fb3f5.exe 24 PID 2240 wrote to memory of 1748 2240 6948024ffc0df8f2c08c14fbfb2fb3f5.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\6948024ffc0df8f2c08c14fbfb2fb3f5.exe"C:\Users\Admin\AppData\Local\Temp\6948024ffc0df8f2c08c14fbfb2fb3f5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:1748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:2508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1076
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:2252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:2592
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:1436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:2768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1124
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:2436
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:2984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c9c0cde2de845b1d45bcdfd31271288d
SHA1dc38253a26a6f76b03897e062862b80d423e2874
SHA256c4adb72d275bc58a79fb5d49df7d560171201f44699b52e51a8b441f4017817c
SHA51263a39f3964a70ccd0351449c2716f433ed8c91be5ddd6f98195a57e0345853b053dff1bfe95e9b635a0779701ee753139b5e3a1dcbc2f4f9dd2f3e289e1eefec