Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-01-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
5c43357a6a83039f911f12055c3c091f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c43357a6a83039f911f12055c3c091f.exe
Resource
win10v2004-20231222-en
General
-
Target
5c43357a6a83039f911f12055c3c091f.exe
-
Size
119KB
-
MD5
5c43357a6a83039f911f12055c3c091f
-
SHA1
1376400bcccc1ba3d5e841c580293f731dc29bfa
-
SHA256
75e2910f87bd02de2914b31c74eccd204912485e2b8365cafd0ce964bd2b0f33
-
SHA512
65f95b8e6ef308bdc3890b0622cf8e129a3e3730486c25890cdb296485e6ea0344572a842a64135c6aaf881d3b5eb2ae8f6634d06ca8aa6620567ea5a01f5e4f
-
SSDEEP
3072:wJJrL8XzYAiluXeea+ng44lN57fXYC4ZFSm8:sGzYAiPe415DoZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2312 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2312 3036 5c43357a6a83039f911f12055c3c091f.exe 28 PID 3036 wrote to memory of 2312 3036 5c43357a6a83039f911f12055c3c091f.exe 28 PID 3036 wrote to memory of 2312 3036 5c43357a6a83039f911f12055c3c091f.exe 28 PID 3036 wrote to memory of 2312 3036 5c43357a6a83039f911f12055c3c091f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c43357a6a83039f911f12055c3c091f.exe"C:\Users\Admin\AppData\Local\Temp\5c43357a6a83039f911f12055c3c091f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Sgv..bat" > nul 2> nul2⤵
- Deletes itself
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5eabbc45d1311f97c00c327f7f054e433
SHA111476cb09ec8a6047f60524383a7b315c3748437
SHA25620321b8074636581f815c24e8b624a2c3ccf192e216c88491187e9d30a36b5eb
SHA512483e570218bb57ebc3e4e58966802cbb77b3d79bad9cb959b490898c233494ad48c524eb77e202bf626dded171676d015e4e07e3255cf80c543e67632353270f