Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-01-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
3f55ec87d860ff2eb3cb1c579fe7c950.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f55ec87d860ff2eb3cb1c579fe7c950.exe
Resource
win10v2004-20231222-en
General
-
Target
3f55ec87d860ff2eb3cb1c579fe7c950.exe
-
Size
5KB
-
MD5
3f55ec87d860ff2eb3cb1c579fe7c950
-
SHA1
9cf30a01b2ccf93b849b86e6507967c8a58575c5
-
SHA256
1d8a469380e3c1097161b3407d07b5d48aab149619110447ae8c0ce0a75d6b85
-
SHA512
9ec5cef0b4eb61d8218b879c6cd8a75b91fd40b250c411bc23f53ece9baf74f525f45a87388ff5133774126308eec817cef9f794333d3c9bbb511fee35f03a99
-
SSDEEP
48:iisByO00YiSWx8vYWEkAlGip7doBMho6bBNtC1ZVBnb:AYiSWxXq2hxY5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2660 hello world.exe -
Loads dropped DLL 2 IoCs
pid Process 2648 3f55ec87d860ff2eb3cb1c579fe7c950.exe 2648 3f55ec87d860ff2eb3cb1c579fe7c950.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2660 2648 3f55ec87d860ff2eb3cb1c579fe7c950.exe 28 PID 2648 wrote to memory of 2660 2648 3f55ec87d860ff2eb3cb1c579fe7c950.exe 28 PID 2648 wrote to memory of 2660 2648 3f55ec87d860ff2eb3cb1c579fe7c950.exe 28 PID 2648 wrote to memory of 2660 2648 3f55ec87d860ff2eb3cb1c579fe7c950.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f55ec87d860ff2eb3cb1c579fe7c950.exe"C:\Users\Admin\AppData\Local\Temp\3f55ec87d860ff2eb3cb1c579fe7c950.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\hello world.exe"C:\Users\Admin\AppData\Local\Temp\hello world.exe"2⤵
- Executes dropped EXE
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD542674f041a9b0264d0a6c771191de3d0
SHA1ed41b98e07545eac410da96512720d9f2d9c25ca
SHA256002d353d8a185b7042cc722a0cd154840eebd1e589832179e91065ba16d9d755
SHA51269546e68b8b0bef8bbae2d182fb7741b638bd2cd47636978b2e154d50a21dae17a38362f29875ab2221d2967c620078f0e976fa189082fcbcd7343919df1f41d