Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
5b48c5f3d1726258b6d51f3372960db6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b48c5f3d1726258b6d51f3372960db6.exe
Resource
win10v2004-20231215-en
General
-
Target
5b48c5f3d1726258b6d51f3372960db6.exe
-
Size
532KB
-
MD5
5b48c5f3d1726258b6d51f3372960db6
-
SHA1
ba90bcabc49fb21ddbe6b5f5069d7b0ea9ced1e4
-
SHA256
6b3298223adbbf4a1066d8e918b1f51bdf4342e2729ff8dc967a8290b9731422
-
SHA512
f22d2f84328c26c3ec1668e6b2cf0e71402f9c0132efd8c5aa6afe32a01332fb33f49fb34713bfe3137986983e983c02a4d94047457b42d8d4d71beddc7a5d29
-
SSDEEP
12288:c68OdfUmfxPH5Y8U1ZtSAQMN7ysMGCRaXakIS:npXvPU5St6L3XakV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1476 cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\newiexplore.exe 5b48c5f3d1726258b6d51f3372960db6.exe File opened for modification C:\Program Files (x86)\Internet Explorer\newiexplore.exe 5b48c5f3d1726258b6d51f3372960db6.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\sppert.ini 5b48c5f3d1726258b6d51f3372960db6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1476 1700 5b48c5f3d1726258b6d51f3372960db6.exe 28 PID 1700 wrote to memory of 1476 1700 5b48c5f3d1726258b6d51f3372960db6.exe 28 PID 1700 wrote to memory of 1476 1700 5b48c5f3d1726258b6d51f3372960db6.exe 28 PID 1700 wrote to memory of 1476 1700 5b48c5f3d1726258b6d51f3372960db6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b48c5f3d1726258b6d51f3372960db6.exe"C:\Users\Admin\AppData\Local\Temp\5b48c5f3d1726258b6d51f3372960db6.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "2⤵
- Deletes itself
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123B
MD580a7ec51089112d397c6d9fc3ead23bd
SHA1baa5d09c218fd450f0d9ab2702c35b509bc2fcb6
SHA2569613332e360af9b53b0207e869bfb0fec8c592dd276caf54c25f223db539eb62
SHA51250bcce8cb9426009fea1fb8dc1ad294719ae583ba8abc5e8bd7af9e876ca5adf9c52aa208010543df95aaea3f6adafa382131130592362fadc3b7bebd8abadaa