Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b67a3add446239bbf3eec73e5a4fc04.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b67a3add446239bbf3eec73e5a4fc04.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
0b67a3add446239bbf3eec73e5a4fc04.exe
-
Size
17KB
-
MD5
0b67a3add446239bbf3eec73e5a4fc04
-
SHA1
4bac8dd8cd9f8380a6f1d2851a826b83bf88df4c
-
SHA256
248c2008fadcda71a0a9aa3a24498abc178d24152e92f2aa10e2cbb3614b1b00
-
SHA512
9bd14f11b683827ce228b8380966bd4e220381a057727e9447286a7830380dc5a29aa875ac84139e7cd7823d3d9e3b4441e9d7e47399f8a03a35d245f17fdf98
-
SSDEEP
384:maW/W9urGOunzVKfhYNklP2BBEwUrJgGZW3kb4Or:cKV+CkluM/JgGb4k
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\7B25941E\ImagePath = "C:\\Windows\\system32\\339FFCF9.EXE -k" 0b67a3add446239bbf3eec73e5a4fc04.exe -
Deletes itself 1 IoCs
pid Process 2932 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 339FFCF9.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\339FFCF9.EXE 0b67a3add446239bbf3eec73e5a4fc04.exe File opened for modification C:\Windows\SysWOW64\339FFCF9.EXE 0b67a3add446239bbf3eec73e5a4fc04.exe File created C:\Windows\SysWOW64\339FFCF9.EXE 339FFCF9.EXE File created C:\Windows\SysWOW64\7C685773.DLL 339FFCF9.EXE File created C:\Windows\SysWOW64\del.bat 0b67a3add446239bbf3eec73e5a4fc04.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2952 0b67a3add446239bbf3eec73e5a4fc04.exe 2084 339FFCF9.EXE 2084 339FFCF9.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2932 2952 0b67a3add446239bbf3eec73e5a4fc04.exe 30 PID 2952 wrote to memory of 2932 2952 0b67a3add446239bbf3eec73e5a4fc04.exe 30 PID 2952 wrote to memory of 2932 2952 0b67a3add446239bbf3eec73e5a4fc04.exe 30 PID 2952 wrote to memory of 2932 2952 0b67a3add446239bbf3eec73e5a4fc04.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b67a3add446239bbf3eec73e5a4fc04.exe"C:\Users\Admin\AppData\Local\Temp\0b67a3add446239bbf3eec73e5a4fc04.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\del.bat2⤵
- Deletes itself
PID:2932
-
-
C:\Windows\SysWOW64\339FFCF9.EXEC:\Windows\SysWOW64\339FFCF9.EXE -k1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2084