Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 11:06
Static task
static1
Behavioral task
behavioral1
Sample
16c1182bbf3efe14caa8452d67a6e313.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
16c1182bbf3efe14caa8452d67a6e313.exe
Resource
win10v2004-20231215-en
General
-
Target
16c1182bbf3efe14caa8452d67a6e313.exe
-
Size
370KB
-
MD5
16c1182bbf3efe14caa8452d67a6e313
-
SHA1
6d5cc4018d63b374fc0b0000d9c5b622ae646a51
-
SHA256
1ac7beaa0a06a5b69e1ccc706030ddd4d675248f5e54fa150849908e158e2111
-
SHA512
f6796d9d1f0d317169256346216ebd107b537908e0af0890414d0d8e0aa6045790d310199e2cca631986aa6e6b14b63b8c523c8c257b483591a75c2d276b8e74
-
SSDEEP
6144:YWMU84YndcRsn2g8VcYXFQx66iPEXBPkubylI2oF7g4boZxnGPaFYMl+:DOdOsnBUcMZpPqtkuG+dbaFpFYC+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3048 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2904 2848 16c1182bbf3efe14caa8452d67a6e313.exe 31 PID 2848 wrote to memory of 2904 2848 16c1182bbf3efe14caa8452d67a6e313.exe 31 PID 2848 wrote to memory of 2904 2848 16c1182bbf3efe14caa8452d67a6e313.exe 31 PID 2848 wrote to memory of 2904 2848 16c1182bbf3efe14caa8452d67a6e313.exe 31 PID 2848 wrote to memory of 3048 2848 16c1182bbf3efe14caa8452d67a6e313.exe 30 PID 2848 wrote to memory of 3048 2848 16c1182bbf3efe14caa8452d67a6e313.exe 30 PID 2848 wrote to memory of 3048 2848 16c1182bbf3efe14caa8452d67a6e313.exe 30 PID 2848 wrote to memory of 3048 2848 16c1182bbf3efe14caa8452d67a6e313.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\16c1182bbf3efe14caa8452d67a6e313.exe"C:\Users\Admin\AppData\Local\Temp\16c1182bbf3efe14caa8452d67a6e313.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\avp.bat" "2⤵
- Deletes itself
PID:3048
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\KaspAVP3.exe"2⤵PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231B
MD556b590d4295a14a1fc4e39ff0db9ff08
SHA1b2db1c194a33d4b41792e283c55861d25993beea
SHA256dab4ceee28064b7e591acf0093c73ee0fadb7e06ac9609349beac51f5d800e83
SHA512f62e1811f5d74b4ffa41e5f555881e16cd6f9392aee706479f4a0a0480df4083b3a5c76208e261da2efa55455f95b07e269f13c30d99e9963bdc1c45b00315ca