Analysis
-
max time kernel
0s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29-12-2023 19:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
024cde85d1a11c1b2e6749ec80b50fad.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
024cde85d1a11c1b2e6749ec80b50fad.exe
-
Size
2.8MB
-
MD5
024cde85d1a11c1b2e6749ec80b50fad
-
SHA1
5f7226f27b0106f6050ce61d78e9c0fc8cfb8373
-
SHA256
db5d4a5090c7303616f88db08a22abc975804ae1abdef9740c208c004648255b
-
SHA512
5016d4eb26602300e49365186ce768026ac73927f41773883a6fc43376b622bc76a2d72d675cfa29224540cf82f8291a9ed03b0d5b762678d30b29f963ee7ccc
-
SSDEEP
49152:KynUHNR9PKXUm1WHyilGSvn/5Kaq1rO5n8UXRaa/B03ak8JqFJ7BHKQk6j:KyUHNjSXUmIHy8Zv/Uaq1yJqak8JqbFR
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2780 bitsfx.txt -
Loads dropped DLL 1 IoCs
pid Process 2668 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2372 2296 024cde85d1a11c1b2e6749ec80b50fad.exe 30 PID 2296 wrote to memory of 2372 2296 024cde85d1a11c1b2e6749ec80b50fad.exe 30 PID 2296 wrote to memory of 2372 2296 024cde85d1a11c1b2e6749ec80b50fad.exe 30 PID 2296 wrote to memory of 2372 2296 024cde85d1a11c1b2e6749ec80b50fad.exe 30 PID 2372 wrote to memory of 2668 2372 cmd.exe 29 PID 2372 wrote to memory of 2668 2372 cmd.exe 29 PID 2372 wrote to memory of 2668 2372 cmd.exe 29 PID 2372 wrote to memory of 2668 2372 cmd.exe 29 PID 2668 wrote to memory of 2780 2668 cmd.exe 28 PID 2668 wrote to memory of 2780 2668 cmd.exe 28 PID 2668 wrote to memory of 2780 2668 cmd.exe 28 PID 2668 wrote to memory of 2780 2668 cmd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\024cde85d1a11c1b2e6749ec80b50fad.exe"C:\Users\Admin\AppData\Local\Temp\024cde85d1a11c1b2e6749ec80b50fad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C start /min C:\Windows\system32\cmd.exe /C bitsfx.txt -p1232⤵
- Suspicious use of WriteProcessMemory
PID:2372
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v "Microsoft InstallShield" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\InstallShield\Desktop.exe" /f1⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v "Microsoft InstallShield" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\InstallShield\Desktop.exe" /f1⤵PID:2824
-
C:\Windows\SysWOW64\xcopy.exexcopy "bit.txt" "C:\Users\Admin\AppData\Roaming\Microsoft\InstallShield\Desktop.exe*" /Y1⤵PID:2800
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C start /min C:\Windows\system32\cmd.exe /C REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v "Microsoft InstallShield" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\InstallShield\Desktop.exe" /f1⤵PID:2852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C xcopy "bit.txt" "C:\Users\Admin\AppData\Roaming\Microsoft\InstallShield\Desktop.exe*" /Y1⤵PID:3060
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C start /min C:\Windows\system32\cmd.exe /C xcopy "bit.txt" "C:\Users\Admin\AppData\Roaming\Microsoft\InstallShield\Desktop.exe*" /Y1⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\bitsfx.txtbitsfx.txt -p1231⤵
- Executes dropped EXE
PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C bitsfx.txt -p1231⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2668