Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 23:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3b61c6148a20523407cd041e5cdfd3fe.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b61c6148a20523407cd041e5cdfd3fe.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3b61c6148a20523407cd041e5cdfd3fe.exe
-
Size
15KB
-
MD5
3b61c6148a20523407cd041e5cdfd3fe
-
SHA1
330c7857e71df97d2af1bb9e586ed71546b950de
-
SHA256
8f462891f26da45b62e3abed171de3f157ed6c5a49fa38b03675514e89e65893
-
SHA512
ad3ff64e7a855f94ff6e834b628e7a918ea5c57f6a1255854f7b301c1f1258d2e62c1b25d3f3853c30fb35fbe02c5be2bf95414acd7ac2afeddac29ea781f984
-
SSDEEP
384:NOVFtSF0Aionwq7+pFNZIOc3NeJQaU5OA6ImwDsvoV5LiXWlfxnD:N8MKo5QAF5UImwDsvi5L/D
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2296 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2760 3b61c6148a20523407cd041e5cdfd3fe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2296 2760 3b61c6148a20523407cd041e5cdfd3fe.exe 28 PID 2760 wrote to memory of 2296 2760 3b61c6148a20523407cd041e5cdfd3fe.exe 28 PID 2760 wrote to memory of 2296 2760 3b61c6148a20523407cd041e5cdfd3fe.exe 28 PID 2760 wrote to memory of 2296 2760 3b61c6148a20523407cd041e5cdfd3fe.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b61c6148a20523407cd041e5cdfd3fe.exe"C:\Users\Admin\AppData\Local\Temp\3b61c6148a20523407cd041e5cdfd3fe.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3B61C6~1.EXE > nul2⤵
- Deletes itself
PID:2296
-