Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 23:36
Static task
static1
Behavioral task
behavioral1
Sample
07216f96f78f6b99baf88c56017d8381.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07216f96f78f6b99baf88c56017d8381.exe
Resource
win10v2004-20231215-en
General
-
Target
07216f96f78f6b99baf88c56017d8381.exe
-
Size
84KB
-
MD5
07216f96f78f6b99baf88c56017d8381
-
SHA1
2754ffbca92d798080d56461473c2cbe2a3163e7
-
SHA256
e7499b75ed2ff125f09fce80ee9069309ccdf6b40d59e499eed8354b2dbd40d2
-
SHA512
6d83252e107e686d0c77e3ca29462543edb997885195b230d97fd7882698852422c1013e803599a12fe87be475b6e04fbf61ef2c3b1f130d988a120e1b3aebd5
-
SSDEEP
1536:Q9wvQUreUbyzsB+2myhzT7hOVATx3svZ5Lm6hsUGurN63EZB:AA/yzn2myhzoV63sthhGumKB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2648 1976 07216f96f78f6b99baf88c56017d8381.exe 28 PID 1976 wrote to memory of 2648 1976 07216f96f78f6b99baf88c56017d8381.exe 28 PID 1976 wrote to memory of 2648 1976 07216f96f78f6b99baf88c56017d8381.exe 28 PID 1976 wrote to memory of 2648 1976 07216f96f78f6b99baf88c56017d8381.exe 28 PID 2648 wrote to memory of 2844 2648 cmd.exe 30 PID 2648 wrote to memory of 2844 2648 cmd.exe 30 PID 2648 wrote to memory of 2844 2648 cmd.exe 30 PID 2648 wrote to memory of 2844 2648 cmd.exe 30 PID 2648 wrote to memory of 2624 2648 cmd.exe 31 PID 2648 wrote to memory of 2624 2648 cmd.exe 31 PID 2648 wrote to memory of 2624 2648 cmd.exe 31 PID 2648 wrote to memory of 2624 2648 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\07216f96f78f6b99baf88c56017d8381.exe"C:\Users\Admin\AppData\Local\Temp\07216f96f78f6b99baf88c56017d8381.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~4402.bat "C:\Users\Admin\AppData\Local\Temp\07216f96f78f6b99baf88c56017d8381.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\reg.exeReg Query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{837b34e3-7c30-493c-8f6a-2b0f04e2912c}" /v "DisplayName"3⤵PID:2844
-
-
C:\Windows\SysWOW64\xcopy.exexcopy .\QQLive\FlashPlayerTrust\*.* "C:\Windows\system32\Macromed\Flash\FlashPlayerTrust\*.*" /y3⤵
- Enumerates system info in registry
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
721B
MD58741d0b9e8150b34770bfcf573aec18f
SHA1f50384b638e60b9e7a7dd920a77869009d4dea53
SHA256633d7c581e641f65097f57dc7c7a61ed552553dea5691414e5bc9c5453bb3f32
SHA512aeeedc5be9502c3a0cd70e659cbb0c7ae1af0595c9992d71bf7ceb9dfb83e896029fca511dbb306185d9d7b726a29000f707bc3924881a01a13a6968fec5225f