Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2024, 03:40

General

  • Target

    4f7ae6da0acc1110ac1a3f3fa08ff73e.exe

  • Size

    181KB

  • MD5

    4f7ae6da0acc1110ac1a3f3fa08ff73e

  • SHA1

    1862949c76c34107420684d8c2b881efbc404e4d

  • SHA256

    59a4cdc57118ed0d37235f02e4b3ec95b52bc9896768f739d69bff7fe919b562

  • SHA512

    1d91eabca4198cdedf40493e6f40aa89b3473e5e3ed176ec952f166536e4f8e884fed927b7cccbc2a19f5c507d304a12ec0f3ac9bd740e1df4a4e76acbbaf1df

  • SSDEEP

    3072:QOXpHv1O0ToutSNOIE7FS/nEjWeablllA:dpVoSSP1EjWHblll

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f7ae6da0acc1110ac1a3f3fa08ff73e.exe
    "C:\Users\Admin\AppData\Local\Temp\4f7ae6da0acc1110ac1a3f3fa08ff73e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2616
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\2491.tmp\load1_link.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run" /v "SilliconTrend" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\runtime.exe" /f
        3⤵
        • Adds Run key to start application
        PID:2840
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\runtime.exe""
        3⤵
          PID:2792

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\2491.tmp\load1_link.bat

            Filesize

            14KB

            MD5

            5328a4c5895e527512a1d49435cbf0d7

            SHA1

            94f7faec7855bebe39f4b6e50596918cc2cb690b

            SHA256

            ca9484bba962de2bd1e29a2a3b2cc307efb6642b5d059fb8d2ed19346725880e

            SHA512

            c40ff6a3458e3e4b9c5ad9249209cf4c6d2b34e875f559af2f0e162cfd2da030fd1472c12af0fc4e89869802159fc7f314781b49340d0ee22c4b882baf4610c3

          • C:\Users\Admin\AppData\Local\Temp\bundandbang.dat

            Filesize

            4KB

            MD5

            09d98f0cc37cc2925cc5d6ff9f09049f

            SHA1

            3679b5bed7d75f0bc108f120b4b0d6340811b264

            SHA256

            933107c154d0201e16ec28a6dc28627e5cf2b4c0f2f9f612054aa08f40ee0d60

            SHA512

            ade80b03480424c58c50aadedc47bd171a4e56abfd3cb07f382212d253445f459b46a9d536bd472513d879dbb4b66246246c87ee693efa68f389f734faaa6319

          • memory/2616-1-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB

          • memory/2616-150-0x0000000000400000-0x0000000000463000-memory.dmp

            Filesize

            396KB