Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
99e83680d570aef725d1d4af7d03f412.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99e83680d570aef725d1d4af7d03f412.exe
Resource
win10v2004-20231215-en
General
-
Target
99e83680d570aef725d1d4af7d03f412.exe
-
Size
137KB
-
MD5
99e83680d570aef725d1d4af7d03f412
-
SHA1
6d33a010d15cef24cdd9703e491a506d1128eb83
-
SHA256
42d77bdb67b9e7291bc1a589cf4c9a54bbfbfb440d252a00f07216c4c1b290e3
-
SHA512
b27ccc1c3ae5c501ca0a292d292346e75615a8adc72b682e9367ed3dff43e0459632deb87a858436b35f6f1a76033cb085b9edc380b0a3b2ea345db1ca4333a1
-
SSDEEP
3072:KbPN+VmC91ASZ4L016HxawPQrwmy5MmtiJCMAiTBtPiSfL/U:KqJZJ1Gx9uwmy7g0biTj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2460 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2460 2212 99e83680d570aef725d1d4af7d03f412.exe 28 PID 2212 wrote to memory of 2460 2212 99e83680d570aef725d1d4af7d03f412.exe 28 PID 2212 wrote to memory of 2460 2212 99e83680d570aef725d1d4af7d03f412.exe 28 PID 2212 wrote to memory of 2460 2212 99e83680d570aef725d1d4af7d03f412.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\99e83680d570aef725d1d4af7d03f412.exe"C:\Users\Admin\AppData\Local\Temp\99e83680d570aef725d1d4af7d03f412.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Tdz..bat" > nul 2> nul2⤵
- Deletes itself
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD58317433732e1c9078eba78fbe4efc804
SHA12b1df05604bb62f282bfacf28bba2933544ba472
SHA25613fc176cd30090474525afce1055cb013119524a429bc0e1ce64966aae0c3bf6
SHA512bbc2bca7a6a7608b64f9bcdfb4c0494dd900eed315b5d7a72cbe06868a95262dac3d0610420f68f15aa75c5d2f1810eb70c1ed21ffea4210381d2ab06a046802