Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
1b6f58ab2f22aa91575b6a80a28dd335.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1b6f58ab2f22aa91575b6a80a28dd335.exe
Resource
win10v2004-20231215-en
General
-
Target
1b6f58ab2f22aa91575b6a80a28dd335.exe
-
Size
49KB
-
MD5
1b6f58ab2f22aa91575b6a80a28dd335
-
SHA1
db0af8c15320740fdca6c1394c6bbd2cd9ecfefd
-
SHA256
0db5b915b764a0e06b43121d88ac51254c0d4bc134fbb3ff2a41fe98b05bdf57
-
SHA512
4190d18d859abef93fb2d10cc1454f5ffb796e22da737530547054d841053345e37b5ebdc3a6dc7561c7e46c96cd1af1f879c2129074ddc0a9f38132591c206d
-
SSDEEP
768:KSwiDGn3Dor4Rh2rMGyqreETOXr79kKOIYe5MD9nFyUBGiSAhRH8:KacUr4Rh2AGyqreEKTru9nFyjiS4a
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 1b6f58ab2f22aa91575b6a80a28dd335.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 1b6f58ab2f22aa91575b6a80a28dd335.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\braviax.exe 1b6f58ab2f22aa91575b6a80a28dd335.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2688 2088 1b6f58ab2f22aa91575b6a80a28dd335.exe 3 PID 2088 wrote to memory of 2688 2088 1b6f58ab2f22aa91575b6a80a28dd335.exe 3 PID 2088 wrote to memory of 2688 2088 1b6f58ab2f22aa91575b6a80a28dd335.exe 3 PID 2088 wrote to memory of 2688 2088 1b6f58ab2f22aa91575b6a80a28dd335.exe 3
Processes
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "1⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\1b6f58ab2f22aa91575b6a80a28dd335.exe"C:\Users\Admin\AppData\Local\Temp\1b6f58ab2f22aa91575b6a80a28dd335.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD5763541e90b60f67d282f18b087a39834
SHA1b44399589c6fc2c095b4f83a8f1c290752da9e69
SHA2562ddce256b7c19736ed5206d341bd111bec5064595743ddbf8ec26a81fbd55d4c
SHA512ada19ac6fc51dba088607c2071d68a49b73fc8bdf924f94611ac4dad8c791aace27bc8995b1b4653940a5058ce180850157056d96994832e4d51af2ad643cbfd