Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 22:29
Behavioral task
behavioral1
Sample
97c69d56acbcd335cfd6f5c7d35a8be5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97c69d56acbcd335cfd6f5c7d35a8be5.exe
Resource
win10v2004-20231222-en
General
-
Target
97c69d56acbcd335cfd6f5c7d35a8be5.exe
-
Size
842KB
-
MD5
97c69d56acbcd335cfd6f5c7d35a8be5
-
SHA1
752618e570aff6ef2ee7034e33503f08d6e28583
-
SHA256
79f83d5aefd04f34c38a3a18cc5af35d579a0910ff41f84bb6095ba0d6b4190b
-
SHA512
d0046737b485013ee9729f266eefab4b65191b943ef72ae76b47c6913a2454bc870ceb0300c7a2b57db0cad922756c4cdc77e6097671d2186e385106080c0b10
-
SSDEEP
24576:DXjQQa7TZ+VuSNym8i09jyxbPjAA4XdYgqD:DXjxaQH09exPAA4XdYgW
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\TXP1atform.exe 97c69d56acbcd335cfd6f5c7d35a8be5.exe File created C:\Windows\SysWOW64\drivers\TXP1atform.exe 97c69d56acbcd335cfd6f5c7d35a8be5.exe -
Deletes itself 1 IoCs
pid Process 3008 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2236 TXP1atform.exe 2912 97c69d56acbcd335cfd6f5c7d35a8be5.exe -
Loads dropped DLL 4 IoCs
pid Process 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 3008 cmd.exe 2912 97c69d56acbcd335cfd6f5c7d35a8be5.exe -
resource yara_rule behavioral1/memory/1032-0-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/files/0x002d000000015c63-10.dat upx behavioral1/memory/1032-18-0x0000000000320000-0x000000000036D000-memory.dmp upx behavioral1/memory/2236-21-0x0000000000400000-0x000000000044D000-memory.dmp upx behavioral1/memory/1032-22-0x0000000000400000-0x000000000044D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 2236 TXP1atform.exe 2236 TXP1atform.exe 2236 TXP1atform.exe 2236 TXP1atform.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3008 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 28 PID 1032 wrote to memory of 3008 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 28 PID 1032 wrote to memory of 3008 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 28 PID 1032 wrote to memory of 3008 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 28 PID 1032 wrote to memory of 2236 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 30 PID 1032 wrote to memory of 2236 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 30 PID 1032 wrote to memory of 2236 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 30 PID 1032 wrote to memory of 2236 1032 97c69d56acbcd335cfd6f5c7d35a8be5.exe 30 PID 3008 wrote to memory of 2912 3008 cmd.exe 31 PID 3008 wrote to memory of 2912 3008 cmd.exe 31 PID 3008 wrote to memory of 2912 3008 cmd.exe 31 PID 3008 wrote to memory of 2912 3008 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\97c69d56acbcd335cfd6f5c7d35a8be5.exe"C:\Users\Admin\AppData\Local\Temp\97c69d56acbcd335cfd6f5c7d35a8be5.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\32$$.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\97c69d56acbcd335cfd6f5c7d35a8be5.exe"C:\Users\Admin\AppData\Local\Temp\97c69d56acbcd335cfd6f5c7d35a8be5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2912
-
-
-
C:\Windows\SysWOW64\drivers\TXP1atform.exeC:\Windows\system32\drivers\TXP1atform.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
485B
MD52488d95891d8348388f167aea2f71819
SHA1d6608afb152da578406bbcd4de3a89813033937b
SHA256b9c41392f9fe7dc7d48d9544470b49e20f9c08b9a207a72d5aec04c1fbbd1ff9
SHA512e4da7ce80cabb0326c56ab49c25079e4a5471f3dc086b760c993ef3ab90a02876e4320ddf28a8bb972c5e91b44c3259dac6b86d28979d222f67eb079e1b4a6ce
-
Filesize
539KB
MD5aa73b17dc72bc890c2a8b410098ff7ea
SHA167acf6d0be38546bf1049666bd069b55da2b068d
SHA2560e6712a387a2b1d1155f9ee95c11f3c1a4ca7c22703d55c2262bbde2e7cc84ae
SHA51288de5b2bcf54c4848c6dc2425d9852093e1c1f1f9168f2bfc66dac4366a592516cde419b001a3261129b82af2611bd967a8a5dcb67e22f8c0797c033584ca1ed
-
Filesize
9KB
MD5ae182dc797cd9ad2c025066692fc041b
SHA17ee5f057be9febfa77f698a1b12213a5bbdd4742
SHA256b214f6d6c4d27f749105f7e8846a7c2d475dbcc966876370b5a7dab6e4b8a471
SHA5122a9a200d067df47638a86f4f058c6d78fb59bd064c65650cae5022a62a3714e33f93f6af1dd599fda180d5af18f432835a1f909807f4fb459aa9d6c24e3fbab7
-
Filesize
303KB
MD5cbad35a0e3159eb883473642e34db265
SHA1eaa8734ba651fc8cb1a08120b7bef634979e2434
SHA2560153eb1c866bb19081df95dc46359c0b0a45f90817a2bf7467475b971161540e
SHA5128c7ee4f033feac01afedea1398dfb98aa1298dce1c6a9962dc88acfc100a9471cfc97c1901ccc610bc949d24f21f2e6e9bd5b56fc09a938bcbf5dbec006c2d20