Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 00:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
70fd6802627d319aa8c735a2ddf76e4f.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
70fd6802627d319aa8c735a2ddf76e4f.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
70fd6802627d319aa8c735a2ddf76e4f.exe
-
Size
152KB
-
MD5
70fd6802627d319aa8c735a2ddf76e4f
-
SHA1
58f977d9879aadc64ffc9485852140922df5dcbc
-
SHA256
fff85a6ec67c92863803c9323cd453845a182b6595672cac13368726be558ced
-
SHA512
b757525d5ee99e5d1a79b6d3c09c3b2a978c59406555400e61b57c61894de438a88c537fea07fa8d873157f4355015e07bc382221c92cf8e7d66e8b22c5d588b
-
SSDEEP
3072:2H1sRlpc6j1GQutQ5bb+utqNt2rRS3Y/gJzJfOJx6X:2HKznRSK5byM8AwYufVX
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
70fd6802627d319aa8c735a2ddf76e4f.exepid process 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe 1940 70fd6802627d319aa8c735a2ddf76e4f.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
70fd6802627d319aa8c735a2ddf76e4f.exeCMD.exeCMD.exeCMD.exeCMD.exedescription pid process target process PID 1940 wrote to memory of 2272 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2272 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2272 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2272 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 2272 wrote to memory of 2876 2272 CMD.exe attrib.exe PID 2272 wrote to memory of 2876 2272 CMD.exe attrib.exe PID 2272 wrote to memory of 2876 2272 CMD.exe attrib.exe PID 2272 wrote to memory of 2876 2272 CMD.exe attrib.exe PID 1940 wrote to memory of 2300 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2300 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2300 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2300 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 2300 wrote to memory of 2768 2300 CMD.exe attrib.exe PID 2300 wrote to memory of 2768 2300 CMD.exe attrib.exe PID 2300 wrote to memory of 2768 2300 CMD.exe attrib.exe PID 2300 wrote to memory of 2768 2300 CMD.exe attrib.exe PID 1940 wrote to memory of 2788 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2788 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2788 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2788 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 2788 wrote to memory of 2688 2788 CMD.exe attrib.exe PID 2788 wrote to memory of 2688 2788 CMD.exe attrib.exe PID 2788 wrote to memory of 2688 2788 CMD.exe attrib.exe PID 2788 wrote to memory of 2688 2788 CMD.exe attrib.exe PID 1940 wrote to memory of 2656 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2656 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2656 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2656 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 2656 wrote to memory of 2664 2656 CMD.exe attrib.exe PID 2656 wrote to memory of 2664 2656 CMD.exe attrib.exe PID 2656 wrote to memory of 2664 2656 CMD.exe attrib.exe PID 2656 wrote to memory of 2664 2656 CMD.exe attrib.exe PID 1940 wrote to memory of 2572 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2572 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2572 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2572 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 3016 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 3016 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 3016 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 3016 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2228 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2228 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2228 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 2228 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 652 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 652 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 652 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe PID 1940 wrote to memory of 652 1940 70fd6802627d319aa8c735a2ddf76e4f.exe CMD.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 2876 attrib.exe 2768 attrib.exe 2688 attrib.exe 2664 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70fd6802627d319aa8c735a2ddf76e4f.exe"C:\Users\Admin\AppData\Local\Temp\70fd6802627d319aa8c735a2ddf76e4f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\CMD.exeCMD /C ATTRIB -s -h -r -a C:\RECYCLER\*.exe /S /D2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeATTRIB -s -h -r -a C:\RECYCLER\*.exe /S /D3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\CMD.exeCMD /C ATTRIB -s -h -r -a %TEMP%\*.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeATTRIB -s -h -r -a C:\Users\Admin\AppData\Local\Temp\*.exe3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\CMD.exeCMD /C ATTRIB -s -h -r -a %WINDIR%\TEMP\*.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeATTRIB -s -h -r -a C:\Windows\TEMP\*.exe3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\CMD.exeCMD /C ATTRIB -s -h -r -a "%USERPROFILE%\*.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeATTRIB -s -h -r -a "C:\Users\Admin\*.exe"3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\CMD.exeCMD /C DEL C:\RECYCLER\*.exe /F /S /Q2⤵
-
C:\Windows\SysWOW64\CMD.exeCMD /C DEL %TEMP%\*.exe /F /Q2⤵
-
C:\Windows\SysWOW64\CMD.exeCMD /C DEL %WINDIR%\TEMP\*.exe /F /Q2⤵
-
C:\Windows\SysWOW64\CMD.exeCMD /C DEL "%USERPROFILE%\*.exe" /F /Q2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1940-1-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1940-0-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1940-3-0x00000000001C0000-0x00000000001C4000-memory.dmpFilesize
16KB
-
memory/1940-2-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1940-4-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/1940-6-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/1940-15-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB