Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 08:10

General

  • Target

    3c568a69f3777513ae82eb0000b8b8be.exe

  • Size

    459KB

  • MD5

    3c568a69f3777513ae82eb0000b8b8be

  • SHA1

    6e7a9aaa245c58e2e9a36e20a6f0e22c8f9a3010

  • SHA256

    55f2032e93ed5746a8f0e4910c31827c81d1c954f2467b38f730226951df9f90

  • SHA512

    fb7ee0b3b47029ce4dcabb4a897f4325ab859da84eb60c2bb3d7d02f4c9c41468ddf046c4140c1fefbb186134d097437c0c2c8c09a0537a283d695def794f16e

  • SSDEEP

    6144:hTfFDbRnOTrfQJdfoQvOYdfoDsYK2lzzWIpGN+QnnwMO5x++oA6nKt2PCpGdL97R:H5OIoQv7gA8xKJ+QwMUoA6niAjGpwiq

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c568a69f3777513ae82eb0000b8b8be.exe
    "C:\Users\Admin\AppData\Local\Temp\3c568a69f3777513ae82eb0000b8b8be.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_290322328225673.bat -Fil',0);window.close()"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_290322328225673.bat" -Fil"
        3⤵
          PID:2696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_290322328225673.bat

      Filesize

      286KB

      MD5

      f9792fa4162b784c413f0158396bc281

      SHA1

      8429a4311633cbb683db46217f7884b1f62c212e

      SHA256

      3f21c459a6de30c5655306e0ae2c7959eacd7f22696ad1bdacfdb65f63a46d73

      SHA512

      00ec4e42d8d887aa8cdaef7a9a73a3106c902d7cc85ba43769482e5c1f6bcc30006846b753d4461402286ba2f0eb8edea16312afc10581b12d022addace03b1c

    • memory/2120-2-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB