Analysis
-
max time kernel
144s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 11:10
Static task
static1
Behavioral task
behavioral1
Sample
69d0fc16d535e74f7de5a1a7a84c7083.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
69d0fc16d535e74f7de5a1a7a84c7083.exe
Resource
win10v2004-20231215-en
General
-
Target
69d0fc16d535e74f7de5a1a7a84c7083.exe
-
Size
137KB
-
MD5
69d0fc16d535e74f7de5a1a7a84c7083
-
SHA1
d1c5fe96c04f3a21fbdadb253be3416abd7f1298
-
SHA256
7eff49f5cba2c204be9911d5cca613dd2f92d74a0193f3b1f9ed68e9a05f5514
-
SHA512
2de2503967e1d4627888d8cc7830a3b6b6f236c5428ee8a42c70ef8974bb0d5b68a5c9633b8c847e80439311265d3ae1b0591becf0da8aa20f7465561dc6b049
-
SSDEEP
3072:Bj8HkShROLbYzIv0ZMqWS7tdI7jgfelN5rqtjtH:Bj8EfwMqWetdZDthH
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winsever.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winsever.exe" 69d0fc16d535e74f7de5a1a7a84c7083.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\delete.bat 69d0fc16d535e74f7de5a1a7a84c7083.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1096 wrote to memory of 4024 1096 69d0fc16d535e74f7de5a1a7a84c7083.exe 88 PID 1096 wrote to memory of 4024 1096 69d0fc16d535e74f7de5a1a7a84c7083.exe 88 PID 1096 wrote to memory of 5056 1096 69d0fc16d535e74f7de5a1a7a84c7083.exe 93 PID 1096 wrote to memory of 5056 1096 69d0fc16d535e74f7de5a1a7a84c7083.exe 93 PID 1096 wrote to memory of 5056 1096 69d0fc16d535e74f7de5a1a7a84c7083.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\69d0fc16d535e74f7de5a1a7a84c7083.exe"C:\Users\Admin\AppData\Local\Temp\69d0fc16d535e74f7de5a1a7a84c7083.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files\Internet Explorer\iexplore.exe-no-remote2⤵PID:4024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\delete.bat2⤵PID:5056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD5c16fa4a5bdd541885cef9656921ecb75
SHA1cb9ff53ec2af0b972e1a2de4cd77267737b6c84e
SHA256bd94c51da3e13476f2a96d248d1c8262f4880430cdbdfd22c7399de07c5d35d0
SHA5125dfc3bb9069ee4ba31bcf5c95906bce4a499f1e49b15df35f539f00d5c2ace000cdc914c7b713ba934e67e34db7bb923322ea563cb0741708589ce9a50f897ea