Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05-01-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
432de01c43ad7d338d1e8c0afd5b9fc6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
432de01c43ad7d338d1e8c0afd5b9fc6.exe
Resource
win10v2004-20231215-en
General
-
Target
432de01c43ad7d338d1e8c0afd5b9fc6.exe
-
Size
110KB
-
MD5
432de01c43ad7d338d1e8c0afd5b9fc6
-
SHA1
fdb350efe94439b49eaa99bf7f742d8ce2e3a63d
-
SHA256
9e69067c752d6c29be74605863444cfad37c7b501ebe6f7b79cdf8caac91ec38
-
SHA512
0d8a8542c003585636826f0e32001a641efa823edbf4086a25ebbdc196f1d5c9f494920f6ee75835295f32590c4e4bce20cdceb71041aabd8976eaaa303d4238
-
SSDEEP
1536:AUAdaM1qL7ZpRlu7XqCvO1/WYBpR6kS/Vqy9DhAobOBUFQX1ntz:A9djM3u7Xq1BPy3hoUFkpt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2480 2192 432de01c43ad7d338d1e8c0afd5b9fc6.exe 28 PID 2192 wrote to memory of 2480 2192 432de01c43ad7d338d1e8c0afd5b9fc6.exe 28 PID 2192 wrote to memory of 2480 2192 432de01c43ad7d338d1e8c0afd5b9fc6.exe 28 PID 2192 wrote to memory of 2480 2192 432de01c43ad7d338d1e8c0afd5b9fc6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\432de01c43ad7d338d1e8c0afd5b9fc6.exe"C:\Users\Admin\AppData\Local\Temp\432de01c43ad7d338d1e8c0afd5b9fc6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Kqj..bat" > nul 2> nul2⤵
- Deletes itself
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD545bbe0daa1c2b75b43944a0774bc2801
SHA1029474bb1864e327910cea462386e96264930fa5
SHA2567e7cc85fa2c35ccae0323ba5f46cb2c40b708d611301f23c5b2b427a95d668cb
SHA512f61c5502535a17ebb4ad07b0b890dda48c4f18c93aa4115f2438c02c74a2b2c00968a92bbe4b886ad84f493f0948b859b410283da1d91b4ad602a0f92480e32a