Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 21:27

General

  • Target

    7b519acd026362872a49899132871073.exe

  • Size

    236KB

  • MD5

    7b519acd026362872a49899132871073

  • SHA1

    92a8be64926eadfdb93c794ace54adfa96f91d61

  • SHA256

    cb68602c9061f567d624af0d727bd906aaa49caeae6c61b1e8079de69b11e452

  • SHA512

    929a26972ca9da51d33621cbb69cf0bfac939f272a07c166b6b766e49299588d20a02f4898dcfcdc4a67ac9d99f141c6126d3ffdfea7b6e8ac56f094dedfe38c

  • SSDEEP

    3072:axMDADKbAtG1HVx+erzAaJ/h2DW2JXefoisp+OQsehH4q4/:aipHVxtEU4hJXefop+oehHR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b519acd026362872a49899132871073.exe
    "C:\Users\Admin\AppData\Local\Temp\7b519acd026362872a49899132871073.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Owf..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2828

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Owf..bat

          Filesize

          210B

          MD5

          5d1ccddb47c7adbc58df3e8075ab23ae

          SHA1

          4880dc20b5a6838be848ec5ed90ff7b7976a5999

          SHA256

          62bb137af2869508f7bddc8452c52cd47a289375dc5872bb3e27641b7487e071

          SHA512

          c2a2c3665a97630a6919fbc6f11572f5ec491c80998e710eb7cd2b29baf2a5a059d05f1132a00ec0586f6d60923f12c7cd8d00ed865d89c77c3a9815ab8ae120

        • memory/2148-0-0x0000000000250000-0x000000000025C000-memory.dmp

          Filesize

          48KB

        • memory/2148-1-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB

        • memory/2148-3-0x0000000000400000-0x0000000000440000-memory.dmp

          Filesize

          256KB