Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2024 12:08

General

  • Target

    9963b2bd0288ca6b4017b1a9f6900314.exe

  • Size

    27KB

  • MD5

    9963b2bd0288ca6b4017b1a9f6900314

  • SHA1

    9c224beda0735de825b21d86c60e39f6b9003c31

  • SHA256

    928761f0f61131cea7f50f618b1e77383225e666f560db7fa272bd4b71553ae4

  • SHA512

    966bf4454c9d0757453b0193e560178e298a2be0713ff1d1f9d446aaf34e1664ecd00c9241b93935a35f644e5715c037dc527589b0073c127500660bdf86cb5e

  • SSDEEP

    768:xpT3GEXV1UnnvGtUBNQuyRD4Mg2OR8bzjaK36tAesVx8xzKLrqaY:HGEF6nuiDGVYSPmtxwx8xz6a

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9963b2bd0288ca6b4017b1a9f6900314.exe
    "C:\Users\Admin\AppData\Local\Temp\9963b2bd0288ca6b4017b1a9f6900314.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\w1.bat" "
      2⤵
        PID:1812
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1356

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\w1.bat

        Filesize

        318B

        MD5

        dc6149593bd862e37257cc3363722069

        SHA1

        2f190742c789f58a6d764c72249300335c3b3336

        SHA256

        d85cbb589cd1e7618b287af804dcb17a218dd47906b1b5608aece164b16e81a7

        SHA512

        60e215b03a6d54a5bdc2bd53f1853ed55cc90b41c52feef9c0ec5777901b1419d546da214c56614609b5928d00e88279616deb5c2af8548f67fedc125aa80825

      • memory/1356-13-0x0000000002980000-0x0000000002981000-memory.dmp

        Filesize

        4KB