Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
4580d4f26911d5512d036d284a46d4b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4580d4f26911d5512d036d284a46d4b3.exe
Resource
win10v2004-20231215-en
General
-
Target
4580d4f26911d5512d036d284a46d4b3.exe
-
Size
33KB
-
MD5
4580d4f26911d5512d036d284a46d4b3
-
SHA1
4ab1518fc79e8893b67f04648cc2010fea53d511
-
SHA256
6a6daec3ef90c6fe1291cfcc1c4580be2813f6d51ba0a5de208ece9f697603da
-
SHA512
f953fc099b7b71a2d3e02b786b8a90bd5da2efb7d2690081f28e45fc28201148574bf963a228b24f99ea8501b39088c26c74d0baa4e5091d86ca538eb0e3591d
-
SSDEEP
384:Dw5+1h1UYii+lNppElKelRgr8I4GSFdVp8NAbifwpIgX+FW3el7xI:2+1hS7i+lbpElBqMB3+I/qWQ7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2868 service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2316 schtasks.exe 2764 schtasks.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2664 2760 4580d4f26911d5512d036d284a46d4b3.exe 28 PID 2760 wrote to memory of 2664 2760 4580d4f26911d5512d036d284a46d4b3.exe 28 PID 2760 wrote to memory of 2664 2760 4580d4f26911d5512d036d284a46d4b3.exe 28 PID 2760 wrote to memory of 2664 2760 4580d4f26911d5512d036d284a46d4b3.exe 28 PID 2664 wrote to memory of 2316 2664 cmd.exe 30 PID 2664 wrote to memory of 2316 2664 cmd.exe 30 PID 2664 wrote to memory of 2316 2664 cmd.exe 30 PID 2664 wrote to memory of 2316 2664 cmd.exe 30 PID 2984 wrote to memory of 2868 2984 taskeng.exe 32 PID 2984 wrote to memory of 2868 2984 taskeng.exe 32 PID 2984 wrote to memory of 2868 2984 taskeng.exe 32 PID 2984 wrote to memory of 2868 2984 taskeng.exe 32 PID 2868 wrote to memory of 2136 2868 service.exe 33 PID 2868 wrote to memory of 2136 2868 service.exe 33 PID 2868 wrote to memory of 2136 2868 service.exe 33 PID 2868 wrote to memory of 2136 2868 service.exe 33 PID 2136 wrote to memory of 2764 2136 cmd.exe 35 PID 2136 wrote to memory of 2764 2136 cmd.exe 35 PID 2136 wrote to memory of 2764 2136 cmd.exe 35 PID 2136 wrote to memory of 2764 2136 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4580d4f26911d5512d036d284a46d4b3.exe"C:\Users\Admin\AppData\Local\Temp\4580d4f26911d5512d036d284a46d4b3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %TEMP%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Local\Temp\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- Creates scheduled task(s)
PID:2316
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D0B27862-8A29-44A1-A5FC-2D7D6E281773} S-1-5-21-3427588347-1492276948-3422228430-1000:QVMRJQQO\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\service.exeC:\Users\Admin\AppData\Local\Temp\service.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %TEMP%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Local\Temp\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f4⤵
- Creates scheduled task(s)
PID:2764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD54580d4f26911d5512d036d284a46d4b3
SHA14ab1518fc79e8893b67f04648cc2010fea53d511
SHA2566a6daec3ef90c6fe1291cfcc1c4580be2813f6d51ba0a5de208ece9f697603da
SHA512f953fc099b7b71a2d3e02b786b8a90bd5da2efb7d2690081f28e45fc28201148574bf963a228b24f99ea8501b39088c26c74d0baa4e5091d86ca538eb0e3591d