Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
4e62e84b2832e1eb7eb5738d94ddc6ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e62e84b2832e1eb7eb5738d94ddc6ac.exe
Resource
win10v2004-20231215-en
General
-
Target
4e62e84b2832e1eb7eb5738d94ddc6ac.exe
-
Size
202KB
-
MD5
4e62e84b2832e1eb7eb5738d94ddc6ac
-
SHA1
beb0f6e9c01b5ac7f7e620ae3f0049fe0bca1b31
-
SHA256
8edadc4ff4a939fa808c7a189d60794b79bc4caae7fda6d6d9c9cc0672810684
-
SHA512
ace8f3dfcca64c51625320add3e327e3a23294dc97c45f703896d87a66a1762562ae574bbb0635eb7a38d0d8fe6b4942dc5a6984f0ca0d538afb60272f7d636d
-
SSDEEP
3072:Trewx2yGwF7Zet/AlbY/9TdtV7OAO571dcr29JZsze:157ZZlbHlpke
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1628 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\stubpath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apple.exe" 4e62e84b2832e1eb7eb5738d94ddc6ac.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2100 wrote to memory of 1628 2100 4e62e84b2832e1eb7eb5738d94ddc6ac.exe 31 PID 2100 wrote to memory of 1628 2100 4e62e84b2832e1eb7eb5738d94ddc6ac.exe 31 PID 2100 wrote to memory of 1628 2100 4e62e84b2832e1eb7eb5738d94ddc6ac.exe 31 PID 2100 wrote to memory of 1628 2100 4e62e84b2832e1eb7eb5738d94ddc6ac.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e62e84b2832e1eb7eb5738d94ddc6ac.exe"C:\Users\Admin\AppData\Local\Temp\4e62e84b2832e1eb7eb5738d94ddc6ac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1.bat2⤵
- Deletes itself
PID:1628
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181B
MD553afc8841c7c75e68a73c37dd63e78b9
SHA1dfdcf5ed96da620b943882ae3287731edb647094
SHA256fb9ab354461bc3a05862f2e346b97cf03d695c1d5d4fd340eaf70b30f2ffdd6d
SHA5122a91f21190e472c09f0e1ffeb2171108453738efcdbd6bd59bdbadf1ff1c9504e74bdbbe61f9cc35ea8026838a4cec6319a02882785ac2b43253f2618ab75353