Analysis
-
max time kernel
117s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 10:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1609d18c06f71cd892d6fb524ecfc2ad.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1609d18c06f71cd892d6fb524ecfc2ad.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
1609d18c06f71cd892d6fb524ecfc2ad.exe
-
Size
56KB
-
MD5
1609d18c06f71cd892d6fb524ecfc2ad
-
SHA1
e2385779359d2642038af6348376be56c5a45bc1
-
SHA256
9df54d4e8faccc9aff9d8ea76a8aaf9e1f64ef0e32dbe9904b4654cee4884e1e
-
SHA512
a094789604def61ae9b5a4b8fe8a679415483d22043d3dc2276f86d708e13394e86dd84e837a305d09a77f151fef7ed75d5489a7c29b25917c5a3fe358c22abc
-
SSDEEP
768:tY0swb0Bhe4KC7ojVTH/EdJ2cTspywATkIOsKCljh:0wuKCchTMdJ6pKHbljh
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2668 1956 1609d18c06f71cd892d6fb524ecfc2ad.exe 16 PID 1956 wrote to memory of 2668 1956 1609d18c06f71cd892d6fb524ecfc2ad.exe 16 PID 1956 wrote to memory of 2668 1956 1609d18c06f71cd892d6fb524ecfc2ad.exe 16 PID 1956 wrote to memory of 2668 1956 1609d18c06f71cd892d6fb524ecfc2ad.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe"C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe" -a1⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe"C:\Users\Admin\AppData\Local\Temp\1609d18c06f71cd892d6fb524ecfc2ad.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1956