Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
3906e293b9e61f325c7f30ed3f0c17d6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3906e293b9e61f325c7f30ed3f0c17d6.exe
Resource
win10v2004-20231215-en
General
-
Target
3906e293b9e61f325c7f30ed3f0c17d6.exe
-
Size
113KB
-
MD5
3906e293b9e61f325c7f30ed3f0c17d6
-
SHA1
346456dfbc68d762089ea8edcb897c501b2f3707
-
SHA256
2ebba430cd86123803c6db3873139bac62616a6b2e5e6492c758966c3bb5e671
-
SHA512
a0f9569aff1e9399851d25873d713065aaaeb041aba0c510e04891e428ae5f611643dabd12056443dbd3a8a06e3d6a02575ecc2a621a31e827e95bdd044b2105
-
SSDEEP
3072:RhTDRkQ6E50IsXz0b+45p3fwoYGX2Jt1b3Mk5LL604FIb:RhTDRkQ6E50fD0b+4vvyGX2JHb8k5LLD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 3906e293b9e61f325c7f30ed3f0c17d6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2252 2180 3906e293b9e61f325c7f30ed3f0c17d6.exe 28 PID 2180 wrote to memory of 2252 2180 3906e293b9e61f325c7f30ed3f0c17d6.exe 28 PID 2180 wrote to memory of 2252 2180 3906e293b9e61f325c7f30ed3f0c17d6.exe 28 PID 2180 wrote to memory of 2252 2180 3906e293b9e61f325c7f30ed3f0c17d6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3906e293b9e61f325c7f30ed3f0c17d6.exe"C:\Users\Admin\AppData\Local\Temp\3906e293b9e61f325c7f30ed3f0c17d6.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Nqp..bat" > nul 2> nul2⤵
- Deletes itself
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5eb34f150079bd10443e718346781b848
SHA1cae72a7344434945134c71fb0db754e8684528b0
SHA256acefa33d694e360e0f3e9c26db60fd8403a7f69f249032b9aee8726fec54817a
SHA512630acdaec0969648e0f350c4318bb9a010af7e68d1aa8577a08c46f118e18e54700aea3c7bb37b323d1da8b03c570814133d261fd90bf2777828f2bbcb70d9bc