Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
58bad37c2d9f4fdb15c39dbf89b1a2e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58bad37c2d9f4fdb15c39dbf89b1a2e5.exe
Resource
win10v2004-20231215-en
General
-
Target
58bad37c2d9f4fdb15c39dbf89b1a2e5.exe
-
Size
93KB
-
MD5
58bad37c2d9f4fdb15c39dbf89b1a2e5
-
SHA1
6d3832ebf696fdbed810badc1e4c15f232fbeb3d
-
SHA256
554624b56261c070988c9fe86b5451014f47dc9dd5d6b5040fdb0da7179543df
-
SHA512
2c12ff4f8e3f3a08c01e56f387606515118efb6213616c91d2b628c10769db24b8d2c349520be49c4315303c47e4144a469bf834c50a5f19c12a107519e126e1
-
SSDEEP
1536:ByQT05QG70AQz6CwvonnZfr0od8yQoAX2D357dGweFrBNo8DirUrlFIy:LZD0o3A2lZirztrlFIy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2780 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2780 2760 58bad37c2d9f4fdb15c39dbf89b1a2e5.exe 28 PID 2760 wrote to memory of 2780 2760 58bad37c2d9f4fdb15c39dbf89b1a2e5.exe 28 PID 2760 wrote to memory of 2780 2760 58bad37c2d9f4fdb15c39dbf89b1a2e5.exe 28 PID 2760 wrote to memory of 2780 2760 58bad37c2d9f4fdb15c39dbf89b1a2e5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58bad37c2d9f4fdb15c39dbf89b1a2e5.exe"C:\Users\Admin\AppData\Local\Temp\58bad37c2d9f4fdb15c39dbf89b1a2e5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Gvf..bat" > nul 2> nul2⤵
- Deletes itself
PID:2780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5912cbdfbb3dbc1c4f166a03992f069ab
SHA1636296bc01a43971e596c7dd7f1a686f5b3ef27c
SHA25613edd5c7a32984e0aa5cd8c6e486d9d3da07f873aff650351b83fe54c31b9e3c
SHA5122c047d7634b032352078677b8bbc1468ae671edc4fa0acc0bfb80ceb2353e9e35b707023051a5d45b22384582945249c4abcb1159fe6b5557f639f064dd446b1