Analysis
-
max time kernel
122s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 08:18
Static task
static1
Behavioral task
behavioral1
Sample
405b80e603d40ae7720ff445fcb990d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
405b80e603d40ae7720ff445fcb990d0.exe
Resource
win10v2004-20231215-en
General
-
Target
405b80e603d40ae7720ff445fcb990d0.exe
-
Size
51KB
-
MD5
405b80e603d40ae7720ff445fcb990d0
-
SHA1
7ecda771f9038b724fb3439d1c41e64e9022f47e
-
SHA256
630e970470d6784589d12212a5c67c9f8f75d330f801b6c519b9b4df12e4c5fe
-
SHA512
7cf7fea4a8c2ed16ba3e174d34d04d956a2b179cd39d3edd824b0407e6f3c0ef91cf71b417e05bdaaf5fc4ce884139310a1deff5efdcf2fbaabaeed9cd4a2626
-
SSDEEP
768:fCru/f9Iw/E6zy4n8uZ5tUXMJ+fROUmELY2glEbM3j+rd+fpRiTWqOM:r1Tzy48untU8fOMEI3jyYfPiROM
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2596 ipconfig.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2856 2476 405b80e603d40ae7720ff445fcb990d0.exe 28 PID 2476 wrote to memory of 2856 2476 405b80e603d40ae7720ff445fcb990d0.exe 28 PID 2476 wrote to memory of 2856 2476 405b80e603d40ae7720ff445fcb990d0.exe 28 PID 2476 wrote to memory of 2856 2476 405b80e603d40ae7720ff445fcb990d0.exe 28 PID 2856 wrote to memory of 2656 2856 cmd.exe 29 PID 2856 wrote to memory of 2656 2856 cmd.exe 29 PID 2856 wrote to memory of 2656 2856 cmd.exe 29 PID 2856 wrote to memory of 2656 2856 cmd.exe 29 PID 2856 wrote to memory of 2656 2856 cmd.exe 29 PID 2856 wrote to memory of 2656 2856 cmd.exe 29 PID 2856 wrote to memory of 2656 2856 cmd.exe 29 PID 2856 wrote to memory of 2764 2856 cmd.exe 30 PID 2856 wrote to memory of 2764 2856 cmd.exe 30 PID 2856 wrote to memory of 2764 2856 cmd.exe 30 PID 2856 wrote to memory of 2764 2856 cmd.exe 30 PID 2856 wrote to memory of 2764 2856 cmd.exe 30 PID 2856 wrote to memory of 2764 2856 cmd.exe 30 PID 2856 wrote to memory of 2764 2856 cmd.exe 30 PID 2856 wrote to memory of 2596 2856 cmd.exe 33 PID 2856 wrote to memory of 2596 2856 cmd.exe 33 PID 2856 wrote to memory of 2596 2856 cmd.exe 33 PID 2856 wrote to memory of 2596 2856 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\405b80e603d40ae7720ff445fcb990d0.exe"C:\Users\Admin\AppData\Local\Temp\405b80e603d40ae7720ff445fcb990d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\B6B2.tmp\crack.bat" "C:\Users\Admin\AppData\Local\Temp\405b80e603d40ae7720ff445fcb990d0.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32 keyboard,disable3⤵PID:2656
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 mouse,disable3⤵PID:2764
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292B
MD5a056c249dcdc460277d301a09ed45ece
SHA1aadad3e8b63e8ebd196125984d6575dea504cca3
SHA2568363760406d20560d22914db96b425d73d3b246433cb63baa0f17a76c7443db2
SHA5128860939f8fcef90c1d5122168a1579b6e5bf22903ca1948c01aa5cc879a57808654cb9d112a53d148ed3ed97e9f658c3acf9b673c5de5ca5f758171a11305dd5