Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2024 12:53

General

  • Target

    5b48c5f3d1726258b6d51f3372960db6.exe

  • Size

    532KB

  • MD5

    5b48c5f3d1726258b6d51f3372960db6

  • SHA1

    ba90bcabc49fb21ddbe6b5f5069d7b0ea9ced1e4

  • SHA256

    6b3298223adbbf4a1066d8e918b1f51bdf4342e2729ff8dc967a8290b9731422

  • SHA512

    f22d2f84328c26c3ec1668e6b2cf0e71402f9c0132efd8c5aa6afe32a01332fb33f49fb34713bfe3137986983e983c02a4d94047457b42d8d4d71beddc7a5d29

  • SSDEEP

    12288:c68OdfUmfxPH5Y8U1ZtSAQMN7ysMGCRaXakIS:npXvPU5St6L3XakV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b48c5f3d1726258b6d51f3372960db6.exe
    "C:\Users\Admin\AppData\Local\Temp\5b48c5f3d1726258b6d51f3372960db6.exe"
    1⤵
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\DelTemp.bat" "
      2⤵
      • Deletes itself
      PID:1476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DelTemp.bat

    Filesize

    123B

    MD5

    80a7ec51089112d397c6d9fc3ead23bd

    SHA1

    baa5d09c218fd450f0d9ab2702c35b509bc2fcb6

    SHA256

    9613332e360af9b53b0207e869bfb0fec8c592dd276caf54c25f223db539eb62

    SHA512

    50bcce8cb9426009fea1fb8dc1ad294719ae583ba8abc5e8bd7af9e876ca5adf9c52aa208010543df95aaea3f6adafa382131130592362fadc3b7bebd8abadaa

  • memory/1700-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1700-17-0x0000000000400000-0x000000000048B000-memory.dmp

    Filesize

    556KB