Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:33
Behavioral task
behavioral1
Sample
070b2234ee9e927d6bcdf4e3e7807834.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
070b2234ee9e927d6bcdf4e3e7807834.exe
Resource
win10v2004-20231215-en
General
-
Target
070b2234ee9e927d6bcdf4e3e7807834.exe
-
Size
61KB
-
MD5
070b2234ee9e927d6bcdf4e3e7807834
-
SHA1
7658ac85545e13578185c2962b9228b50765aea9
-
SHA256
57cbfc97f66180857aeb0c0357519a8d36c26de740ce239ce7f8439a73388759
-
SHA512
321b0b611c0a6b2bfc63334f5e1e5dc8dab64dd1579aa8d91d7447e50ef2de67780e294bd25e4c5bc060358159ca2eb84793fd28c0f7b8b673350c89fe290fa5
-
SSDEEP
1536:KhdMtS1j6vrpGBk9hEfDnzGzLxIAU/x55WaSUS:K9j6vgyavWUp5In
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1784 cmd.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 070b2234ee9e927d6bcdf4e3e7807834.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2644 070b2234ee9e927d6bcdf4e3e7807834.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1784 2644 070b2234ee9e927d6bcdf4e3e7807834.exe 28 PID 2644 wrote to memory of 1784 2644 070b2234ee9e927d6bcdf4e3e7807834.exe 28 PID 2644 wrote to memory of 1784 2644 070b2234ee9e927d6bcdf4e3e7807834.exe 28 PID 2644 wrote to memory of 1784 2644 070b2234ee9e927d6bcdf4e3e7807834.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\070b2234ee9e927d6bcdf4e3e7807834.exe"C:\Users\Admin\AppData\Local\Temp\070b2234ee9e927d6bcdf4e3e7807834.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\070B22~1.EXE > nul2⤵
- Deletes itself
PID:1784
-