Analysis
-
max time kernel
139s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
27b453ff321dc06e7837fba30cbcd1e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27b453ff321dc06e7837fba30cbcd1e3.exe
Resource
win10v2004-20231215-en
General
-
Target
27b453ff321dc06e7837fba30cbcd1e3.exe
-
Size
18KB
-
MD5
27b453ff321dc06e7837fba30cbcd1e3
-
SHA1
11e08a7ddc59fa47b8158baecc8e63b85d4f5f23
-
SHA256
1e8c6c89f2f0bc6414b19717292dc2ab16e7f60a19a326438857128163f9cbd6
-
SHA512
a2088d0a4ac652da5052d480a2f502ef3671f0b1dd4e363c4753490927640a58f7251f33e84de1cf199238fbff67a03e9dce9ca4e297b018aca590995fac3d8a
-
SSDEEP
384:7TOwsi81JC/27BgvVQK/KXcRY1VDRWK8GulnEuTTtWOeo:psi81s/Oc3KXce1VDRD8DlnEe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1288 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl 27b453ff321dc06e7837fba30cbcd1e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" 27b453ff321dc06e7837fba30cbcd1e3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID 27b453ff321dc06e7837fba30cbcd1e3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 27b453ff321dc06e7837fba30cbcd1e3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1288 3012 27b453ff321dc06e7837fba30cbcd1e3.exe 31 PID 3012 wrote to memory of 1288 3012 27b453ff321dc06e7837fba30cbcd1e3.exe 31 PID 3012 wrote to memory of 1288 3012 27b453ff321dc06e7837fba30cbcd1e3.exe 31 PID 3012 wrote to memory of 1288 3012 27b453ff321dc06e7837fba30cbcd1e3.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\27b453ff321dc06e7837fba30cbcd1e3.exe"C:\Users\Admin\AppData\Local\Temp\27b453ff321dc06e7837fba30cbcd1e3.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵
- Deletes itself
PID:1288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD54aea744ce3afade46ae7e6d87a87e00d
SHA173ab2ee17ca40aacfd94037e81ec821fb7fec6dd
SHA25692665d73e1d2a40536295ae9e0af65b2975004540f0e8dcb93660baf174f83ea
SHA5129db8fd405db122858bfe9465d03346fe8bd9432aec194a941db68188969998f9e6b798fd4fdf1e66df2c521842b18dff1279f2082df30e3ba3b4ab4338dda9e6