Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
963e267343fb77b6cbb071c114b8570a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
963e267343fb77b6cbb071c114b8570a.exe
Resource
win10v2004-20231222-en
General
-
Target
963e267343fb77b6cbb071c114b8570a.exe
-
Size
167KB
-
MD5
963e267343fb77b6cbb071c114b8570a
-
SHA1
ede0b6afe205724a7313aaccbfbe71c335c24a43
-
SHA256
afe5cba6519ed81fd93246a6f11b946bb1713039798e06f4b3e3065496165c50
-
SHA512
2b1eb5ad16df00acad8d05dce8dcfab945a5e51843602d37cd5f5e5e54f98492f3bbc0e04d813f920477e4d841f99c3f05305ba2a421ee5a472cf71c18d3a4c1
-
SSDEEP
3072:+qwnALiATU+lsg2dx062lqqQwVBQ4/54z1xsOed+4auIlSct:6HNqsg2D0Hltx/5wx0QXuI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 944 wrote to memory of 2196 944 963e267343fb77b6cbb071c114b8570a.exe 28 PID 944 wrote to memory of 2196 944 963e267343fb77b6cbb071c114b8570a.exe 28 PID 944 wrote to memory of 2196 944 963e267343fb77b6cbb071c114b8570a.exe 28 PID 944 wrote to memory of 2196 944 963e267343fb77b6cbb071c114b8570a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\963e267343fb77b6cbb071c114b8570a.exe"C:\Users\Admin\AppData\Local\Temp\963e267343fb77b6cbb071c114b8570a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Lpb..bat" > nul 2> nul2⤵
- Deletes itself
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5327f2b35f653cc7d3869e7800d26fe39
SHA1dd200b9a118b71a838ea7d19293e8fbf82bc8231
SHA256dbdbba49dfd353cf04f093cc1dc3865adb5364b253960352362bba0f3eac94bb
SHA512fdf4187fd2efd9be28e9325a30eef9937e7b997017eebcb26aa4f5fc7382d8620905b976df528e9acf1d3900964b693caab0682a27fe62fb492773e2b297d758