Analysis
-
max time kernel
5s -
max time network
303s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
08/01/2024, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe
Resource
win10-20231220-en
General
-
Target
b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe
-
Size
5.7MB
-
MD5
b0eb07d6a79d273dcaeec43cb6f10c20
-
SHA1
b5fc1499ea997d513f4d501d31e47c508a7a17d9
-
SHA256
b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47
-
SHA512
f6b26a7037621294968fb9b4c2e4a1ec1c256a19cbe33aff5c3a9ac9de9194ed8080526b425dd851262a90f3351d9911d18d59dfb5d176cb44898e3fa4bb0299
-
SSDEEP
98304:TGAwYG+73YnFYkY3/SFrKZ0tuljc0wWrqKrMg/jYVSFnf81WzXUJjN2ql/:TGAwYG+TEYt/SgZ0ItvtOKrx/f8IzXUR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3880 XRJNZC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3904 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3572 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2704 b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe 2704 b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe 3880 XRJNZC.exe 3880 XRJNZC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2704 wrote to memory of 396 2704 b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe 28 PID 2704 wrote to memory of 396 2704 b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe 28 PID 2704 wrote to memory of 396 2704 b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe 28 PID 396 wrote to memory of 3572 396 cmd.exe 29 PID 396 wrote to memory of 3572 396 cmd.exe 29 PID 396 wrote to memory of 3572 396 cmd.exe 29 PID 396 wrote to memory of 3880 396 cmd.exe 77 PID 396 wrote to memory of 3880 396 cmd.exe 77 PID 396 wrote to memory of 3880 396 cmd.exe 77 PID 3880 wrote to memory of 3904 3880 XRJNZC.exe 79 PID 3880 wrote to memory of 3904 3880 XRJNZC.exe 79 PID 3880 wrote to memory of 3904 3880 XRJNZC.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe"C:\Users\Admin\AppData\Local\Temp\b08f002a851d216ea0f372406f94c446c5b8b0a49cf1b0faac5b73d151022a47.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s234.0.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3572
-
-
C:\ProgramData\pinterests\XRJNZC.exe"C:\ProgramData\pinterests\XRJNZC.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "XRJNZC" /tr C:\ProgramData\pinterests\XRJNZC.exe /f4⤵
- Creates scheduled task(s)
PID:3904
-
-
-
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵PID:4748
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵PID:2780
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵PID:4780
-
C:\ProgramData\pinterests\XRJNZC.exeC:\ProgramData\pinterests\XRJNZC.exe1⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5910107b17ee30adcc683316e456c79c2
SHA1aa80f12df45966539154340683ec7a760675bf24
SHA256a7d8d9e947aecc69b641910eb17f1bcb276f8ce5de827b9b71097b3dcf2e78e2
SHA51258f3ef49b338f2befd32e1696d9586dab6633b6e7ef7734eeb0194c3a6197377b9e1bbfdab403ab318124eff7a911b840b2406590af5037ef35010602f3d61b6
-
Filesize
33KB
MD5f96cecd24c13c13b16172a7b80752a75
SHA1ca2fca5aa48337e93a2dc86d8c8ec2d9f147012b
SHA256da1183129542fb4d448660c4d6a0b2398271de884da7cf0f155cd996b3196c80
SHA5120f7edccb32019fd430463e66add7f0d341d2563f84dcf988184cc6107ce2a55c2fdcc7c4b5e5d6a3148df0e8bdac4269b85a4bbc3fd4eddb2e818574ab5e8d20
-
Filesize
43KB
MD588d3c427834c73fd840907eebf28ecdd
SHA1aed6099ff000fe8068b1454664d9ccaa650c82b2
SHA25634ba8f89d39ad669b939a4ff93370e981d4515b172776ad4f0d1f47a97b7d2c4
SHA512d31df5404f556d64b789ac3c680f75388cae9fe2b8a72cf6111a6d319d81ddb724eedab659b7d93521744ad109941eb282771597c3f9e47d2174249577e56d9c
-
Filesize
44KB
MD50fa3749ea5ee32a1747870848c808fd8
SHA1af1ff65589a1e8d9f71625156dd6e2b9cc3428c5
SHA256572f8cc4c815f381ed7360ff3d2a7660c7fde556e8f985a7df8662c35528b8b3
SHA51256219245dad0b4c08d518da4e103ad822a5899ce4d2da935a4f482422efe45cbe1cb8fad41213e957c8984329554711b8ae6d82523e5b78acc9c97a0a87ba9f5
-
Filesize
132KB
MD55d5b167343899de175bd1d1184036c54
SHA13a80c9d7a5f58250c4e1bd3b9d108e46baa13df8
SHA256c47856b64ba6e016ef8ed2a227a2d210e3009935df0ee4a9f18e1ec59d248dd5
SHA51249b60a146331f5ca33be1f1c54de4d50ef9c90c95148f26fd2b23d1d8041c48567f5d21cbf356c4cfa9ce971e41717b3bdf635af0dfc849468ce808533e67bf6
-
Filesize
176B
MD5ff47648915daa8ae908166b1d79b44c2
SHA11329323cb4a7579d17f402d637f8215dcb3a81a2
SHA256ac283209ff95133f0ebbd4f7cb633b844a1c23d3a2b590ad003bf98ab63afe23
SHA51244d5e84d3cc2074799b1f9dc224bcf9338d0e081296bf811401f58f4318dfe50ec017e9bca5935b8d93ccb77277dee73f9a30e40922885da558925b3f47b70ad