Analysis
-
max time kernel
4s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
08e57a269a3479a7417ace82e0560d65.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08e57a269a3479a7417ace82e0560d65.exe
Resource
win10v2004-20231215-en
General
-
Target
08e57a269a3479a7417ace82e0560d65.exe
-
Size
1.6MB
-
MD5
08e57a269a3479a7417ace82e0560d65
-
SHA1
5635aed8464092c34c5591a78e206d5840417395
-
SHA256
132bddbcd40f6c3164cf7aef6ac3c0869286dccb70ecb061d796721047a5cca7
-
SHA512
66b3555a6655ba26c933ad40500b4b77dc88d16f4731e8c9716761724f3710a36fb4666f452418ad90429716e3edcfa144a5d50f6d5309a5fac80acd01d04ec6
-
SSDEEP
49152:XZgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S91:XGIjR1Oh0TB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2648 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2176 08e57a269a3479a7417ace82e0560d65.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2176 08e57a269a3479a7417ace82e0560d65.exe 2176 08e57a269a3479a7417ace82e0560d65.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e57a269a3479a7417ace82e0560d65.exe"C:\Users\Admin\AppData\Local\Temp\08e57a269a3479a7417ace82e0560d65.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\21483.bat" "C:\Users\Admin\AppData\Local\Temp\687283ED8C9B46B5BB25BEE3B2C816E2\""2⤵PID:2936
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\687283ED8C9B46B5BB25BEE3B2C816E2\687283ED8C9B46B5BB25BEE3B2C816E2_LogFile.txt
Filesize1KB
MD5e0fadd50da2d6fa2a17efd53a90f4b7f
SHA1defa4dde538c7b6d444a6c1e55ae9b674ef13234
SHA256680885a31b733938fb4b245e432f230ffa1d2e59aca36d3de6b2442b6df14a9c
SHA512c162940df28c14f599a4c1d746abd72384fbd523b117349387ab7a8180b87872f648a8fddbae07b46805da00922444cb4bf7c2763c58bfb4ebc55d9837722e29
-
C:\Users\Admin\AppData\Local\Temp\687283ED8C9B46B5BB25BEE3B2C816E2\687283ED8C9B46B5BB25BEE3B2C816E2_LogFile.txt
Filesize5KB
MD591c2b243eb0a5857e366247ad0144f0c
SHA1b320ace30c50167b3040dd7a8819fba674915914
SHA256a5923b4b7d99f101972623e1a8a4117131856bb1f7a960fa875bc8779b60459f
SHA5129726405336d302579a42281bb78e883dc56e6d4806911eadc0415275a2fd7a9695149cace29716bad3fc7153b04cd5252eb8321bae2f19100e110c9caf65f01d
-
Filesize
42KB
MD5b9faca06bbe12c05ae4b23d034476496
SHA1c50c9552ce1b5d0e119dc8c466a832b238239bb3
SHA256e08712a7a23be06aa5ba839a8ade6caff081f28f8453628bada47562d75eecae
SHA512c85f60f3fab67edb6f54902fccea17946590bb8d4e7745197663471121be238efb5c9cf099a3f8a106e3db9dae28d8af9133a50104cab76ccc7d9176dbe00f6f
-
Filesize
4KB
MD5f0a648bb0d6d90b4fe693866339e4087
SHA1289554c4a65879c300038b49c58b32013a78f1be
SHA2568f6ebf172dfda1c376fb314ba9c2cde29ae52c0969edbce01e6de86eb94cb1f4
SHA51259a5602a89e06bd018445b2e6368c41ad7bc435946d0a8d27ced79ca735e0dda6e1c76b4bb0682b526b63af7cfd59b8fd1d11ff048260fc48010084884a0196d
-
Filesize
115KB
MD593de636c87425ae363b393724d4b9fb8
SHA18fb5eafa8dbbcaa84cbe5968b3b70bcd90297635
SHA256eb854dadee72e6b2acee1bf45ea1ff49465bc67bcc7f25e3950f830c6e5f4d48
SHA512dbd5c998ee936641d4296f88bbb7a401073e8cc7d7056bef507d703defce64da2bc3211eb01bb40982ada68d9d0b79254218454b6b3d730499b38f20c7b4f989