Analysis

  • max time kernel
    151s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 14:28

General

  • Target

    1b6f58ab2f22aa91575b6a80a28dd335.exe

  • Size

    49KB

  • MD5

    1b6f58ab2f22aa91575b6a80a28dd335

  • SHA1

    db0af8c15320740fdca6c1394c6bbd2cd9ecfefd

  • SHA256

    0db5b915b764a0e06b43121d88ac51254c0d4bc134fbb3ff2a41fe98b05bdf57

  • SHA512

    4190d18d859abef93fb2d10cc1454f5ffb796e22da737530547054d841053345e37b5ebdc3a6dc7561c7e46c96cd1af1f879c2129074ddc0a9f38132591c206d

  • SSDEEP

    768:KSwiDGn3Dor4Rh2rMGyqreETOXr79kKOIYe5MD9nFyUBGiSAhRH8:KacUr4Rh2AGyqreEKTru9nFyjiS4a

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\SysWOW64\cmd.exe
    cmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "
    1⤵
      PID:2688
    • C:\Users\Admin\AppData\Local\Temp\1b6f58ab2f22aa91575b6a80a28dd335.exe
      "C:\Users\Admin\AppData\Local\Temp\1b6f58ab2f22aa91575b6a80a28dd335.exe"
      1⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2088

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\delself.bat

            Filesize

            202B

            MD5

            763541e90b60f67d282f18b087a39834

            SHA1

            b44399589c6fc2c095b4f83a8f1c290752da9e69

            SHA256

            2ddce256b7c19736ed5206d341bd111bec5064595743ddbf8ec26a81fbd55d4c

            SHA512

            ada19ac6fc51dba088607c2071d68a49b73fc8bdf924f94611ac4dad8c791aace27bc8995b1b4653940a5058ce180850157056d96994832e4d51af2ad643cbfd

          • memory/2088-0-0x0000000000220000-0x000000000022C000-memory.dmp

            Filesize

            48KB

          • memory/2088-11-0x0000000000400000-0x000000000040F000-memory.dmp

            Filesize

            60KB