Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:26
Behavioral task
behavioral1
Sample
0b9ceca622b4a4badc8e48f2e8e0eb59.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0b9ceca622b4a4badc8e48f2e8e0eb59.exe
Resource
win10v2004-20231215-en
General
-
Target
0b9ceca622b4a4badc8e48f2e8e0eb59.exe
-
Size
12KB
-
MD5
0b9ceca622b4a4badc8e48f2e8e0eb59
-
SHA1
87279d2c23ae211ee3c0d722a06d58703d38315e
-
SHA256
a3fbaeca21d704315ecf9b3cae732b377038a9d20c7ed7eb23215557f99abbbb
-
SHA512
67004620fb7138fa72be4109806379ce361044014bd788c9cb2e1da6698554af1cc53ac2db35601fcf7488965b2f29cf4776650a3413d88ab6156b8d24d5689c
-
SSDEEP
192:ba5xm+bwCUMFWI3uYMDyoi6EanMwzU7TZ3GtmcLL1I:bavm+0oWI3WdlzGcI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2928 cmd.exe -
resource yara_rule behavioral1/memory/2652-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2652-1-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2652-5-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2652-9-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral1/memory/2652-21-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" 0b9ceca622b4a4badc8e48f2e8e0eb59.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID 0b9ceca622b4a4badc8e48f2e8e0eb59.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl 0b9ceca622b4a4badc8e48f2e8e0eb59.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2760 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 28 PID 2652 wrote to memory of 2760 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 28 PID 2652 wrote to memory of 2760 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 28 PID 2652 wrote to memory of 2760 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 28 PID 2652 wrote to memory of 2928 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 32 PID 2652 wrote to memory of 2928 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 32 PID 2652 wrote to memory of 2928 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 32 PID 2652 wrote to memory of 2928 2652 0b9ceca622b4a4badc8e48f2e8e0eb59.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9ceca622b4a4badc8e48f2e8e0eb59.exe"C:\Users\Admin\AppData\Local\Temp\0b9ceca622b4a4badc8e48f2e8e0eb59.exe"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:2760
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\wewt0.bat" "2⤵
- Deletes itself
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5d9b606006d34e3ad777f6c4ace625500
SHA1634c19565f485166562be7c4ca7bcfddbcef9632
SHA2569788c59fe2c2654763d9a886045a510eaefe2dc1353249686168fb009de8a7f0
SHA512334a583632f049b5a15e3d3f8e32176b6a7870c7a383164ab8bb5a3a9774578a8692e48b35011846ba9434acd83d31777553ae0438956c5064367d9b78214cf4