Analysis
-
max time kernel
255s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01/01/2024, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
Resource
win10-20231215-en
General
-
Target
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe
-
Size
5.4MB
-
MD5
9152994148ace0cc7c6962b2251d2300
-
SHA1
1e7ded397e115958acce7801f8e570a1de0e2006
-
SHA256
f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b
-
SHA512
8a48233b0b9f01aca0192ec8471b1faae7e8c1edee25aaca9a79a01daf7451a0ab91c1f2b6448aea332bd3ae2330dcfbf54cfcb2340450cd0757d449b95f8f16
-
SSDEEP
98304:sNTxIQBMEMOup7bJxETJ6+LWx3U+WWdtFpp17lO1CagxktFNhjISLAd+OHNsx:jQ3L6Ho6+Uk+Wup17solsfhsSLi+Px
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 3580 XRJNZC.exe 2116 XRJNZC.exe 1936 XRJNZC.exe 4052 XRJNZC.exe 4788 XRJNZC.exe 3192 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3212 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3256 timeout.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 228 wrote to memory of 3868 228 f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe 48 PID 228 wrote to memory of 3868 228 f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe 48 PID 228 wrote to memory of 3868 228 f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe 48 PID 3868 wrote to memory of 3256 3868 cmd.exe 51 PID 3868 wrote to memory of 3256 3868 cmd.exe 51 PID 3868 wrote to memory of 3256 3868 cmd.exe 51 PID 3868 wrote to memory of 3580 3868 cmd.exe 75 PID 3868 wrote to memory of 3580 3868 cmd.exe 75 PID 3868 wrote to memory of 3580 3868 cmd.exe 75 PID 3580 wrote to memory of 3212 3580 XRJNZC.exe 77 PID 3580 wrote to memory of 3212 3580 XRJNZC.exe 77 PID 3580 wrote to memory of 3212 3580 XRJNZC.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe"C:\Users\Admin\AppData\Local\Temp\f5767cee5859134828942b664dae053d8146447bb30cc7e1771fcb9f6348ec8b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s6c.0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3256
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:3212
-
-
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:2116
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:1936
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:4052
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:4788
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵
- Executes dropped EXE
PID:3192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52415541e8ebbe11031afaf489457e967
SHA1f4841283f6c559989c77beee0901b8d628e74ef1
SHA256d6b96e78e005f070ac114eef7667027b9595efab1cc4643ede9251a66e384763
SHA512bbf004f10dda598883aa8da5fcf049d66759362e65efb011f850ff737e08e21c074acbbca2cb48d009609173b70f41c8c6d71dc4dcfac5a20c65777c5327a0b7
-
Filesize
381KB
MD5c1b9f2599fe24f1931520a7f77587e72
SHA1df1b505be1708d19b339902188267e0c7ae8a753
SHA2562519fbba77201c7b0ea607da3158531b4d57266430c5f0e5838d0dd7dc71e2e6
SHA512fe07b4043f803a1f9e02442d6eb95301aa81c38895dca71a69d1a15c732fc63102bc1b07ec7f12b00ccd04c3aa1b0b6ee6109dd6bdf693e0230d3aae2b401c58