Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/01/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
5ac6c14b512743403dd77dab4baf2698.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ac6c14b512743403dd77dab4baf2698.exe
Resource
win10v2004-20231215-en
General
-
Target
5ac6c14b512743403dd77dab4baf2698.exe
-
Size
16KB
-
MD5
5ac6c14b512743403dd77dab4baf2698
-
SHA1
085f2fd7fbb9ff969c79bead5fa43934d3c796fb
-
SHA256
75f2bae6386fccb0ea85ad247f29dd0b56fc5856bbabdda5f8ee52f3f6a77a01
-
SHA512
7ce83bc9daa10cdac8f10c2be5b85a18c133088715e8005f3b3e45d2ec290fc295c480e688e35bab0c73c5f69408530752cdd9803577fa6146998fe7f484ce91
-
SSDEEP
96:eO+XMGJIVah4O75wyWsrzVVftcMlmA4ppTRQZoVEc2:vGgaCutcvA4+GVEc
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 5ac6c14b512743403dd77dab4baf2698.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 3988 1496 5ac6c14b512743403dd77dab4baf2698.exe 91 PID 1496 wrote to memory of 3988 1496 5ac6c14b512743403dd77dab4baf2698.exe 91 PID 1496 wrote to memory of 3988 1496 5ac6c14b512743403dd77dab4baf2698.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ac6c14b512743403dd77dab4baf2698.exe"C:\Users\Admin\AppData\Local\Temp\5ac6c14b512743403dd77dab4baf2698.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c start d:\1.exe2⤵
- Enumerates connected drives
PID:3988
-