Analysis
-
max time kernel
17s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 03:30
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
4a51bb861f7c39b35a65d52117a0a791.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
4a51bb861f7c39b35a65d52117a0a791.exe
Resource
win10v2004-20231215-en
0 signatures
150 seconds
General
-
Target
4a51bb861f7c39b35a65d52117a0a791.exe
-
Size
964KB
-
MD5
4a51bb861f7c39b35a65d52117a0a791
-
SHA1
179818c4dc3bc8a322c32c7b444156b183632a52
-
SHA256
59b5e9f83ecf333b81f8716c3badb3933a68813fcc993a5ee218620031d26de0
-
SHA512
bc1d3c3170599887aa786b0f1e1df232bce656ed08a083e439b51307fc2fd8d8bddfe2a35e89d46677fb8577d427439117eeb028c836a4e54258d4f21451bc51
-
SSDEEP
24576:BSuFhCwUuqDluBMfEhJX3z5mKhwbLebaJ:VhxqDosEL3F/w+baJ
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2164 4a51bb861f7c39b35a65d52117a0a791.exe 2164 4a51bb861f7c39b35a65d52117a0a791.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2164 4a51bb861f7c39b35a65d52117a0a791.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2760 2164 4a51bb861f7c39b35a65d52117a0a791.exe 29 PID 2164 wrote to memory of 2760 2164 4a51bb861f7c39b35a65d52117a0a791.exe 29 PID 2164 wrote to memory of 2760 2164 4a51bb861f7c39b35a65d52117a0a791.exe 29 PID 2164 wrote to memory of 2760 2164 4a51bb861f7c39b35a65d52117a0a791.exe 29 PID 2164 wrote to memory of 2760 2164 4a51bb861f7c39b35a65d52117a0a791.exe 29 PID 2164 wrote to memory of 2760 2164 4a51bb861f7c39b35a65d52117a0a791.exe 29 PID 2164 wrote to memory of 2760 2164 4a51bb861f7c39b35a65d52117a0a791.exe 29 PID 2164 wrote to memory of 2132 2164 4a51bb861f7c39b35a65d52117a0a791.exe 28 PID 2164 wrote to memory of 2132 2164 4a51bb861f7c39b35a65d52117a0a791.exe 28 PID 2164 wrote to memory of 2132 2164 4a51bb861f7c39b35a65d52117a0a791.exe 28 PID 2164 wrote to memory of 2132 2164 4a51bb861f7c39b35a65d52117a0a791.exe 28 PID 2164 wrote to memory of 2132 2164 4a51bb861f7c39b35a65d52117a0a791.exe 28 PID 2164 wrote to memory of 2132 2164 4a51bb861f7c39b35a65d52117a0a791.exe 28 PID 2164 wrote to memory of 2132 2164 4a51bb861f7c39b35a65d52117a0a791.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a51bb861f7c39b35a65d52117a0a791.exe"C:\Users\Admin\AppData\Local\Temp\4a51bb861f7c39b35a65d52117a0a791.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\temg_tmp.bat"2⤵PID:2132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\smes\u.bat"2⤵PID:2760
-