Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 12:44
Static task
static1
Behavioral task
behavioral1
Sample
6f713340e3fbe367b4edb2bd4c0c397d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6f713340e3fbe367b4edb2bd4c0c397d.exe
Resource
win10v2004-20231215-en
General
-
Target
6f713340e3fbe367b4edb2bd4c0c397d.exe
-
Size
94KB
-
MD5
6f713340e3fbe367b4edb2bd4c0c397d
-
SHA1
eaf477ff32dac4e565d62f2f1fd7c1e96e914275
-
SHA256
3c82fed002c07a5754c06c88f204417c428fc77ef360b05f36bda2d974a8804f
-
SHA512
408e661d3fce27be7ba3cab2fca5542fd5c8142199206e2d9b390452df03cf9fc5731817900ed7693800ff021cb1bf8b3539eb8b558555d6507922c2a6f3520d
-
SSDEEP
1536:ffg+M2Y9oH+cpTKeyaI0Z/od8bDbRvU5yYeVYXrgITAGXBB3exYEjpepikFIy:ffgyY9oH+cTKGI0Z/oooeVYXrgI0GXW4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1572 wrote to memory of 2180 1572 6f713340e3fbe367b4edb2bd4c0c397d.exe 28 PID 1572 wrote to memory of 2180 1572 6f713340e3fbe367b4edb2bd4c0c397d.exe 28 PID 1572 wrote to memory of 2180 1572 6f713340e3fbe367b4edb2bd4c0c397d.exe 28 PID 1572 wrote to memory of 2180 1572 6f713340e3fbe367b4edb2bd4c0c397d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f713340e3fbe367b4edb2bd4c0c397d.exe"C:\Users\Admin\AppData\Local\Temp\6f713340e3fbe367b4edb2bd4c0c397d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Dxf..bat" > nul 2> nul2⤵
- Deletes itself
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5a95901f74ec29bff13e9609b56d3bc92
SHA1c70725da5a6f24660981548df1604fa538bb491e
SHA256170499780cecc276c27851e356cca5166a2506ab3fda98912d22b715011d7aed
SHA512152d9c1d7ac40ec97b1a156dca44b17abf6877c50ce30ddfdca8bb1b33b9227df7ce29d05e60809ca0b5af6d758d637274a6fa95bc6408616a8d35c939c7d530