Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:08
Behavioral task
behavioral1
Sample
13072dbf2120fc3e50da647d6b1a10ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13072dbf2120fc3e50da647d6b1a10ac.exe
Resource
win10v2004-20231215-en
General
-
Target
13072dbf2120fc3e50da647d6b1a10ac.exe
-
Size
64KB
-
MD5
13072dbf2120fc3e50da647d6b1a10ac
-
SHA1
edc55dfd7c91c449271643115eb626b2ea6b757a
-
SHA256
7017a00263f2b703a6ac713f74dea5c26dc3e65ee63ec77698e9737c1586b9fb
-
SHA512
510b3da2750af2728ee90bb6a02de00822dc1a9f35b8bc2733d282e1d351cc07309e370f36985dc61908bb45e2fb836b2f30c10f8287014516b23996651ea5d1
-
SSDEEP
1536:lQLH56LNQrYJUzY0brW8wxI/yO/b6cPLIU3:lKHsNRx2rVN/RX3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2460 cmd.exe -
resource yara_rule behavioral1/memory/3032-0-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 13072dbf2120fc3e50da647d6b1a10ac.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2460 3032 13072dbf2120fc3e50da647d6b1a10ac.exe 28 PID 3032 wrote to memory of 2460 3032 13072dbf2120fc3e50da647d6b1a10ac.exe 28 PID 3032 wrote to memory of 2460 3032 13072dbf2120fc3e50da647d6b1a10ac.exe 28 PID 3032 wrote to memory of 2460 3032 13072dbf2120fc3e50da647d6b1a10ac.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\13072dbf2120fc3e50da647d6b1a10ac.exe"C:\Users\Admin\AppData\Local\Temp\13072dbf2120fc3e50da647d6b1a10ac.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qnb..bat" > nul 2> nul2⤵
- Deletes itself
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5eaa166a31d0b7515894362cc2b35364e
SHA1417fc872c4abf806300ca67ac1047f55646ca8f6
SHA25633b159a83b924d5256e4d0bced4c0a442ea80b0b1eb1cec6fe7babaa9aed6421
SHA512285f2d9909e37bc4c5d18cbf2697b278e497dfca050e4536bc06f7a7f5e575da80674a932897cf6c866d56655607fcb2c2cd7f73405aa37afa10bb58949534fc