Analysis

  • max time kernel
    117s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 10:33

General

  • Target

    1609d18c06f71cd892d6fb524ecfc2ad.exe

  • Size

    56KB

  • MD5

    1609d18c06f71cd892d6fb524ecfc2ad

  • SHA1

    e2385779359d2642038af6348376be56c5a45bc1

  • SHA256

    9df54d4e8faccc9aff9d8ea76a8aaf9e1f64ef0e32dbe9904b4654cee4884e1e

  • SHA512

    a094789604def61ae9b5a4b8fe8a679415483d22043d3dc2276f86d708e13394e86dd84e837a305d09a77f151fef7ed75d5489a7c29b25917c5a3fe358c22abc

  • SSDEEP

    768:tY0swb0Bhe4KC7ojVTH/EdJ2cTspywATkIOsKCljh:0wuKCchTMdJ6pKHbljh

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe
    "C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe" -a
    1⤵
      PID:2668
    • C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe
      "C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1956

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads