Analysis

  • max time kernel
    122s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 22:44

General

  • Target

    1ed9cb0d0583de97598ff3de95457b18.exe

  • Size

    143KB

  • MD5

    1ed9cb0d0583de97598ff3de95457b18

  • SHA1

    0f6338d45e24abf3281beaafb1302df5247f7c03

  • SHA256

    30f269f7fa97dfbe79f844f942087bb7951a43a3d0c5e01dabd21de863e35908

  • SHA512

    735047a1c1154bdea05bd6739d9af4be2ab2138aad404ed5a587c4f7084f7aa0c901a0e018553a54257104fbcbff458598d0b5d539ba5fd0e5037c51ea9bbb35

  • SSDEEP

    3072:u3+zoLcd80wJmxgWw/l3s43P98RHlP/spL+fRYLmgGTULpyXevlmSbReH:u4oA8CqP/l3s4/98fPEpVmBT2uwlm

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ed9cb0d0583de97598ff3de95457b18.exe
    "C:\Users\Admin\AppData\Local\Temp\1ed9cb0d0583de97598ff3de95457b18.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Skv..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Skv..bat

          Filesize

          210B

          MD5

          6e1cbde84d69b48fdceb03e7cfb393a5

          SHA1

          fb30fa550368c891620fa7263c8b769a5f8f7690

          SHA256

          7b103f6b89cc86977fb731100a145085330f7072327847ad0bc05f7112e211f8

          SHA512

          23751d2bfc5e7ec0e2576049c2a26c4fe9e5e3c9d94ca4217ee2b7b66c47a8885d2715a3cdb86c146c0291d37f085a344e36d6b277060d9a7907f31175189a26

        • memory/2188-0-0x00000000001B0000-0x00000000001DF000-memory.dmp

          Filesize

          188KB

        • memory/2188-1-0x00000000001B0000-0x00000000001DF000-memory.dmp

          Filesize

          188KB

        • memory/2188-2-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB

        • memory/2188-4-0x0000000000400000-0x0000000000426000-memory.dmp

          Filesize

          152KB