Analysis

  • max time kernel
    0s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 13:42

General

  • Target

    1a5f78810dbe52b8dbf9cf2b1fe43759.exe

  • Size

    67KB

  • MD5

    1a5f78810dbe52b8dbf9cf2b1fe43759

  • SHA1

    660680eefed07ed6d872352854e25707d13bf903

  • SHA256

    d4813f35ce9cce7d59b111fa6d30b640fa5ecef081863c70d0169f9286ee294c

  • SHA512

    9f8ca9021275666baa1e3e4e795e52e1c6c298d7f86fddc170faf795d2a3e251747ba156116056188e51cf11fa484c274cffe83e6684a6227a75370061d3e3ef

  • SSDEEP

    1536:cHReXoVXfxsTTKN2gHI2h2k57Ih+fQDIhx92heXMzJ:cHRsXSNl7hN575QDIv2heXMN

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe
    "C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe
      "C:\Users\Admin\AppData\Local\Temp\1a5f78810dbe52b8dbf9cf2b1fe43759.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      PID:1536
  • C:\Windows\SysWOW64\CMD.exe
    CMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.com"
    1⤵
      PID:2652
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1A5F78~1.EXE > nul
      1⤵
        PID:2640
      • C:\Windows\SysWOW64\CMD.exe
        CMD /C del /F /S /Q "%HOMEPATH%\My Documents\My Recieved Files\*.zip"
        1⤵
          PID:2676
        • C:\Windows\SysWOW64\symdvcmg.exe
          "C:\Windows\SysWOW64\symdvcmg.exe"
          1⤵
            PID:2660
          • C:\Windows\SysWOW64\CMD.exe
            CMD /C del /F /S /Q *.com
            1⤵
              PID:2656
            • C:\Windows\SysWOW64\CMD.exe
              CMD /C del /F /S /Q *.zip
              1⤵
                PID:2608
              • C:\Windows\SysWOW64\symdvcmg.exe
                "C:\Windows\system32\symdvcmg.exe"
                1⤵
                  PID:1696

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/1536-15-0x0000000010000000-0x000000001000C000-memory.dmp

                  Filesize

                  48KB

                • memory/1536-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                  Filesize

                  4KB

                • memory/1536-10-0x0000000010000000-0x000000001000C000-memory.dmp

                  Filesize

                  48KB

                • memory/1536-7-0x0000000010000000-0x000000001000C000-memory.dmp

                  Filesize

                  48KB

                • memory/1536-4-0x0000000010000000-0x000000001000C000-memory.dmp

                  Filesize

                  48KB

                • memory/1536-2-0x0000000010000000-0x000000001000C000-memory.dmp

                  Filesize

                  48KB

                • memory/1536-0-0x0000000010000000-0x000000001000C000-memory.dmp

                  Filesize

                  48KB

                • memory/1696-37-0x0000000010000000-0x0000000010018000-memory.dmp

                  Filesize

                  96KB

                • memory/2248-14-0x0000000010000000-0x0000000010018000-memory.dmp

                  Filesize

                  96KB