Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
3c568a69f3777513ae82eb0000b8b8be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c568a69f3777513ae82eb0000b8b8be.exe
Resource
win10v2004-20231222-en
General
-
Target
3c568a69f3777513ae82eb0000b8b8be.exe
-
Size
459KB
-
MD5
3c568a69f3777513ae82eb0000b8b8be
-
SHA1
6e7a9aaa245c58e2e9a36e20a6f0e22c8f9a3010
-
SHA256
55f2032e93ed5746a8f0e4910c31827c81d1c954f2467b38f730226951df9f90
-
SHA512
fb7ee0b3b47029ce4dcabb4a897f4325ab859da84eb60c2bb3d7d02f4c9c41468ddf046c4140c1fefbb186134d097437c0c2c8c09a0537a283d695def794f16e
-
SSDEEP
6144:hTfFDbRnOTrfQJdfoQvOYdfoDsYK2lzzWIpGN+QnnwMO5x++oA6nKt2PCpGdL97R:H5OIoQv7gA8xKJ+QwMUoA6niAjGpwiq
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3068 2120 3c568a69f3777513ae82eb0000b8b8be.exe 28 PID 2120 wrote to memory of 3068 2120 3c568a69f3777513ae82eb0000b8b8be.exe 28 PID 2120 wrote to memory of 3068 2120 3c568a69f3777513ae82eb0000b8b8be.exe 28 PID 2120 wrote to memory of 3068 2120 3c568a69f3777513ae82eb0000b8b8be.exe 28 PID 3068 wrote to memory of 2696 3068 mshta.exe 29 PID 3068 wrote to memory of 2696 3068 mshta.exe 29 PID 3068 wrote to memory of 2696 3068 mshta.exe 29 PID 3068 wrote to memory of 2696 3068 mshta.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c568a69f3777513ae82eb0000b8b8be.exe"C:\Users\Admin\AppData\Local\Temp\3c568a69f3777513ae82eb0000b8b8be.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_290322328225673.bat -Fil',0);window.close()"2⤵
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_290322328225673.bat" -Fil"3⤵PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5f9792fa4162b784c413f0158396bc281
SHA18429a4311633cbb683db46217f7884b1f62c212e
SHA2563f21c459a6de30c5655306e0ae2c7959eacd7f22696ad1bdacfdb65f63a46d73
SHA51200ec4e42d8d887aa8cdaef7a9a73a3106c902d7cc85ba43769482e5c1f6bcc30006846b753d4461402286ba2f0eb8edea16312afc10581b12d022addace03b1c