Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 00:44

General

  • Target

    70fd6802627d319aa8c735a2ddf76e4f.exe

  • Size

    152KB

  • MD5

    70fd6802627d319aa8c735a2ddf76e4f

  • SHA1

    58f977d9879aadc64ffc9485852140922df5dcbc

  • SHA256

    fff85a6ec67c92863803c9323cd453845a182b6595672cac13368726be558ced

  • SHA512

    b757525d5ee99e5d1a79b6d3c09c3b2a978c59406555400e61b57c61894de438a88c537fea07fa8d873157f4355015e07bc382221c92cf8e7d66e8b22c5d588b

  • SSDEEP

    3072:2H1sRlpc6j1GQutQ5bb+utqNt2rRS3Y/gJzJfOJx6X:2HKznRSK5byM8AwYufVX

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70fd6802627d319aa8c735a2ddf76e4f.exe
    "C:\Users\Admin\AppData\Local\Temp\70fd6802627d319aa8c735a2ddf76e4f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a C:\RECYCLER\*.exe /S /D
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a C:\RECYCLER\*.exe /S /D
        3⤵
        • Views/modifies file attributes
        PID:2876
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a %TEMP%\*.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a C:\Users\Admin\AppData\Local\Temp\*.exe
        3⤵
        • Views/modifies file attributes
        PID:2768
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a %WINDIR%\TEMP\*.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a C:\Windows\TEMP\*.exe
        3⤵
        • Views/modifies file attributes
        PID:2688
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C ATTRIB -s -h -r -a "%USERPROFILE%\*.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\attrib.exe
        ATTRIB -s -h -r -a "C:\Users\Admin\*.exe"
        3⤵
        • Views/modifies file attributes
        PID:2664
    • C:\Windows\SysWOW64\CMD.exe
      CMD /C DEL C:\RECYCLER\*.exe /F /S /Q
      2⤵
        PID:2572
      • C:\Windows\SysWOW64\CMD.exe
        CMD /C DEL %TEMP%\*.exe /F /Q
        2⤵
          PID:3016
        • C:\Windows\SysWOW64\CMD.exe
          CMD /C DEL %WINDIR%\TEMP\*.exe /F /Q
          2⤵
            PID:2228
          • C:\Windows\SysWOW64\CMD.exe
            CMD /C DEL "%USERPROFILE%\*.exe" /F /Q
            2⤵
              PID:652

          Network

          MITRE ATT&CK Matrix ATT&CK v13

          Defense Evasion

          Hide Artifacts

          1
          T1564

          Hidden Files and Directories

          1
          T1564.001

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1940-1-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/1940-0-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/1940-3-0x00000000001C0000-0x00000000001C4000-memory.dmp
            Filesize

            16KB

          • memory/1940-2-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/1940-4-0x0000000000250000-0x0000000000251000-memory.dmp
            Filesize

            4KB

          • memory/1940-6-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB

          • memory/1940-15-0x0000000000400000-0x0000000000458000-memory.dmp
            Filesize

            352KB