Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 13:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1a5f78810dbe52b8dbf9cf2b1fe43759.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
1a5f78810dbe52b8dbf9cf2b1fe43759.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
1a5f78810dbe52b8dbf9cf2b1fe43759.exe
-
Size
67KB
-
MD5
1a5f78810dbe52b8dbf9cf2b1fe43759
-
SHA1
660680eefed07ed6d872352854e25707d13bf903
-
SHA256
d4813f35ce9cce7d59b111fa6d30b640fa5ecef081863c70d0169f9286ee294c
-
SHA512
9f8ca9021275666baa1e3e4e795e52e1c6c298d7f86fddc170faf795d2a3e251747ba156116056188e51cf11fa484c274cffe83e6684a6227a75370061d3e3ef
-
SSDEEP
1536:cHReXoVXfxsTTKN2gHI2h2k57Ih+fQDIhx92heXMzJ:cHRsXSNl7hN575QDIv2heXMN
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec DVC Manager = "symdvcmg.exe" 1a5f78810dbe52b8dbf9cf2b1fe43759.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\symdvcmg.exe 1a5f78810dbe52b8dbf9cf2b1fe43759.exe File opened for modification C:\Windows\SysWOW64\symdvcmg.exe 1a5f78810dbe52b8dbf9cf2b1fe43759.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2248 set thread context of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27 PID 2248 wrote to memory of 1536 2248 1a5f78810dbe52b8dbf9cf2b1fe43759.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe"C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe"C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1536
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"1⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1A5F78~1.EXE > nul1⤵PID:2640
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"1⤵PID:2676
-
C:\Windows\SysWOW64\symdvcmg.exe"C:\Windows\SysWOW64\symdvcmg.exe"1⤵PID:2660
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com1⤵PID:2656
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip1⤵PID:2608
-
C:\Windows\SysWOW64\symdvcmg.exe"C:\Windows\system32\symdvcmg.exe"1⤵PID:1696