Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
6413a3b05e35b43347c0daa34bc1c885.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6413a3b05e35b43347c0daa34bc1c885.exe
Resource
win10v2004-20231215-en
General
-
Target
6413a3b05e35b43347c0daa34bc1c885.exe
-
Size
362KB
-
MD5
6413a3b05e35b43347c0daa34bc1c885
-
SHA1
9da08721790f82b02c5c90a38eb0004263f0eaf6
-
SHA256
b1d2db539892482fe0a2ed5546c21563e738d413a0d3b47dd23d0656d9f953d2
-
SHA512
0ec6be2510395380e8dbc243d97f657698306998013832172c70fcea2c3b51817171d3e08ec8a8fa05ab6429e9dfff3d5f827160b3e3b65acec8143b462c11f2
-
SSDEEP
6144:f3Ll+NrqylPw5Aann0hgzsPy14S9QPCSNqHNcMBBS7pxxx:PLuqePWp0hgzGWOPBNqHNlwpxxx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 fldprgmra.exe -
Loads dropped DLL 3 IoCs
pid Process 3032 cmd.exe 3032 cmd.exe 2608 fldprgmra.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2712 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2732 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 taskkill.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3032 2172 6413a3b05e35b43347c0daa34bc1c885.exe 28 PID 2172 wrote to memory of 3032 2172 6413a3b05e35b43347c0daa34bc1c885.exe 28 PID 2172 wrote to memory of 3032 2172 6413a3b05e35b43347c0daa34bc1c885.exe 28 PID 2172 wrote to memory of 3032 2172 6413a3b05e35b43347c0daa34bc1c885.exe 28 PID 3032 wrote to memory of 2712 3032 cmd.exe 30 PID 3032 wrote to memory of 2712 3032 cmd.exe 30 PID 3032 wrote to memory of 2712 3032 cmd.exe 30 PID 3032 wrote to memory of 2712 3032 cmd.exe 30 PID 3032 wrote to memory of 2732 3032 cmd.exe 32 PID 3032 wrote to memory of 2732 3032 cmd.exe 32 PID 3032 wrote to memory of 2732 3032 cmd.exe 32 PID 3032 wrote to memory of 2732 3032 cmd.exe 32 PID 3032 wrote to memory of 2608 3032 cmd.exe 33 PID 3032 wrote to memory of 2608 3032 cmd.exe 33 PID 3032 wrote to memory of 2608 3032 cmd.exe 33 PID 3032 wrote to memory of 2608 3032 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6413a3b05e35b43347c0daa34bc1c885.exe"C:\Users\Admin\AppData\Local\Temp\6413a3b05e35b43347c0daa34bc1c885.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 2172 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\6413a3b05e35b43347c0daa34bc1c885.exe" & start C:\Users\Admin\AppData\Local\FLDPRG~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 21723⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2732
-
-
C:\Users\Admin\AppData\Local\fldprgmra.exeC:\Users\Admin\AppData\Local\FLDPRG~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD56413a3b05e35b43347c0daa34bc1c885
SHA19da08721790f82b02c5c90a38eb0004263f0eaf6
SHA256b1d2db539892482fe0a2ed5546c21563e738d413a0d3b47dd23d0656d9f953d2
SHA5120ec6be2510395380e8dbc243d97f657698306998013832172c70fcea2c3b51817171d3e08ec8a8fa05ab6429e9dfff3d5f827160b3e3b65acec8143b462c11f2