Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
76778a14c8c926b8ba9a210b4b88faec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76778a14c8c926b8ba9a210b4b88faec.exe
Resource
win10v2004-20231215-en
General
-
Target
76778a14c8c926b8ba9a210b4b88faec.exe
-
Size
94KB
-
MD5
76778a14c8c926b8ba9a210b4b88faec
-
SHA1
39e082b2dd2c50aae6195f33191d8be2344e7f08
-
SHA256
818c3ebc9d264b7f19444a9c0aadc04980b05969f2ed41da7ae6fa4c1d33384f
-
SHA512
624cbeb3ed9a72076093a73ef07b951a8e2fc645b2ec02669934c34f3cb2a14417c918c673f09baf9f95991a5830da88726191c1b6139ebeb9cccfbc00724584
-
SSDEEP
1536:kWq8QUsRxkA6ln1mf9EE1+ThAcr0yNMbrAnL6zS27xsXS4KIYu+RlsgyQ87F4sNH:N9qxqw9bwTh30yyMnL6zS27xsX3Kp/LC
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\packageinfo = "\"packageinfo \"" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2868 reg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2724 2672 76778a14c8c926b8ba9a210b4b88faec.exe 28 PID 2672 wrote to memory of 2724 2672 76778a14c8c926b8ba9a210b4b88faec.exe 28 PID 2672 wrote to memory of 2724 2672 76778a14c8c926b8ba9a210b4b88faec.exe 28 PID 2672 wrote to memory of 2724 2672 76778a14c8c926b8ba9a210b4b88faec.exe 28 PID 2724 wrote to memory of 2836 2724 cmd.exe 30 PID 2724 wrote to memory of 2836 2724 cmd.exe 30 PID 2724 wrote to memory of 2836 2724 cmd.exe 30 PID 2724 wrote to memory of 2836 2724 cmd.exe 30 PID 2836 wrote to memory of 2868 2836 cmd.exe 31 PID 2836 wrote to memory of 2868 2836 cmd.exe 31 PID 2836 wrote to memory of 2868 2836 cmd.exe 31 PID 2836 wrote to memory of 2868 2836 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\76778a14c8c926b8ba9a210b4b88faec.exe"C:\Users\Admin\AppData\Local\Temp\76778a14c8c926b8ba9a210b4b88faec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\syscheck.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V packageinfo /D "\"packageinfo \"" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V packageinfo /D "\"packageinfo \"" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:2868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125B
MD5b76e95682010f57bfdb402a0f49e44f6
SHA10441c5140b02d42e2e5e6d01742d1d186de54063
SHA256d14f16d2d48a2e76211d01d5ba623ad03a59994f7bd0dccaba9c507588778e38
SHA5123c92519a446ae4578cdb0cceeff6dd63121d3875034ee56379591d2f529250054be29c5bbef4f5cddef41b2dfbb2db1f879f89932e69384e4e0200c87dc49847