Analysis
-
max time kernel
5s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
Resource
win10-20231215-en
General
-
Target
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
-
Size
5.4MB
-
MD5
9152994148ace0cc7c6962b2251d2300
-
SHA1
1e7ded397e115958acce7801f8e570a1de0e2006
-
SHA256
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b
-
SHA512
8a48233b0b9f01aca0192ec8471b1faae7e8c1edee25aaca9a79a01daf7451a0ab91c1f2b6448aea332bd3ae2330dcfbf54cfcb2340450cd0757d449b95f8f16
-
SSDEEP
98304:sNTxIQBMEMOup7bJxETJ6+LWx3U+WWdtFpp17lO1CagxktFNhjISLAd+OHNsx:jQ3L6Ho6+Uk+Wup17solsfhsSLi+Px
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2800 XRJNZC.exe -
Loads dropped DLL 1 IoCs
pid Process 2688 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2740 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2724 timeout.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2688 2552 f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe 30 PID 2552 wrote to memory of 2688 2552 f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe 30 PID 2552 wrote to memory of 2688 2552 f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe 30 PID 2552 wrote to memory of 2688 2552 f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe 30 PID 2688 wrote to memory of 2724 2688 cmd.exe 28 PID 2688 wrote to memory of 2724 2688 cmd.exe 28 PID 2688 wrote to memory of 2724 2688 cmd.exe 28 PID 2688 wrote to memory of 2724 2688 cmd.exe 28 PID 2688 wrote to memory of 2800 2688 cmd.exe 31 PID 2688 wrote to memory of 2800 2688 cmd.exe 31 PID 2688 wrote to memory of 2800 2688 cmd.exe 31 PID 2688 wrote to memory of 2800 2688 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe"C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s1yw.0.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:2740
-
-
-
-
C:\Windows\SysWOW64\timeout.exetimeout 31⤵
- Delays execution with timeout.exe
PID:2724
-
C:\Windows\system32\taskeng.exetaskeng.exe {7AD561CC-724A-4A5F-A483-F8B4C05DE1B8} S-1-5-21-3601492379-692465709-652514833-1000:CALKHSYM\Admin:Interactive:[1]1⤵PID:2716
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵PID:1152
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵PID:2920
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵PID:1540
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵PID:268
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe2⤵PID:2364
-