Analysis
-
max time kernel
1s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
12e2e3896b34c59c90b436e3245d80ff.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
12e2e3896b34c59c90b436e3245d80ff.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
12e2e3896b34c59c90b436e3245d80ff.exe
-
Size
42KB
-
MD5
12e2e3896b34c59c90b436e3245d80ff
-
SHA1
764b2be5323ef6f66cf2614d4a6f50a2f0a85691
-
SHA256
cd4f6b784e998bb2d3a466a4c5c851338d640ac3fe12e2dac5bcffd23cae665d
-
SHA512
e85c69ebd8b00e717e46aa66cc5a24bb0e0a21df05414e44b4abc054dbc8e0df769541afb80a5b05ef59a7745e672b90bcfe329fdcb99b7e6b946f3a84458dce
-
SSDEEP
768:cHwPmlu0S9A/e8xCJr3SEr8xo1pKDElDhIUfWK2LKZ2NxCXCJGD34SXeeP:c6mIh9AW8xCoQ8xMYDElDai2NYyehtP
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 12e2e3896b34c59c90b436e3245d80ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 12e2e3896b34c59c90b436e3245d80ff.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\braviax.exe 12e2e3896b34c59c90b436e3245d80ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 824 2172 12e2e3896b34c59c90b436e3245d80ff.exe 16 PID 2172 wrote to memory of 824 2172 12e2e3896b34c59c90b436e3245d80ff.exe 16 PID 2172 wrote to memory of 824 2172 12e2e3896b34c59c90b436e3245d80ff.exe 16 PID 2172 wrote to memory of 824 2172 12e2e3896b34c59c90b436e3245d80ff.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\12e2e3896b34c59c90b436e3245d80ff.exe"C:\Users\Admin\AppData\Local\Temp\12e2e3896b34c59c90b436e3245d80ff.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "2⤵PID:824
-