Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
48c33a380ff727429804cf986959f3a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48c33a380ff727429804cf986959f3a9.exe
Resource
win10v2004-20231215-en
General
-
Target
48c33a380ff727429804cf986959f3a9.exe
-
Size
49KB
-
MD5
48c33a380ff727429804cf986959f3a9
-
SHA1
bb95304aac319b430040e832a637aaa7b787f9e7
-
SHA256
2c7d6c8765b0bebfa9dce69e847aa0c4a534b7902f6d6496a1d08b3babbc9d4d
-
SHA512
7f30143e66e0d4230818ef3072c46ff4389fd728326d2f219a9cd24ed19163f055596ab9c11ed420950e57d4ddb08903648d1deee0fcd3aada54f93ddb1b86a9
-
SSDEEP
768:EyAUnK3IgiSaaVWmGJl8Mm0+byVw5BF985pwvv+HJq+JyKxqTOKu58VSDR:eUnQUSqmG00qCwLHmphJbAOKVSD
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 48c33a380ff727429804cf986959f3a9.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\braviax = "C:\\Windows\\system32\\braviax.exe" 48c33a380ff727429804cf986959f3a9.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\braviax.exe 48c33a380ff727429804cf986959f3a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2708 1236 48c33a380ff727429804cf986959f3a9.exe 28 PID 1236 wrote to memory of 2708 1236 48c33a380ff727429804cf986959f3a9.exe 28 PID 1236 wrote to memory of 2708 1236 48c33a380ff727429804cf986959f3a9.exe 28 PID 1236 wrote to memory of 2708 1236 48c33a380ff727429804cf986959f3a9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\48c33a380ff727429804cf986959f3a9.exe"C:\Users\Admin\AppData\Local\Temp\48c33a380ff727429804cf986959f3a9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "2⤵PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202B
MD53d0dfa11952e24da153ce96cb611e0f4
SHA11ec1859a40616e4d1179de820d8c2d1c3f3f67d2
SHA25674b8df2111e79286baa857ddbc8d733234c57b5f2216a8363813028a3cca6525
SHA512d63e1a114e5f29d21ab9a886b8affcd2159e642665727ecb530ca692d523a70f832d26551371d844d79f82abe478069ae51c5a659313431d7e41408161d4284a