Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
a238ec19680d297363db8d02862fea2a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a238ec19680d297363db8d02862fea2a.exe
Resource
win10v2004-20240221-en
General
-
Target
a238ec19680d297363db8d02862fea2a.exe
-
Size
109KB
-
MD5
a238ec19680d297363db8d02862fea2a
-
SHA1
23e51dc159f5988b90763a4baa205e9bc1de2420
-
SHA256
3ed0f0284cd43453274781c85fe492e9fee84b899dc0dec8a8fc5d7293d447d9
-
SHA512
35b6e3d99960c5a73e1e891d540a6a8fa3fc9450068817064236e2283eaddf4d6cccecb1e81a033c8a6e3abc00a7c868724ad0ad51b7ef68f1e5dccab6f7c229
-
SSDEEP
1536:mT00CLEUPU5gTSU+djB5G93/IF44ebMXQhzZmdcPXk8NUd7vJtHxv/7VAVFIb:mTpC4cM6SrdjB7XLXmHNUtxtLAVFIb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier a238ec19680d297363db8d02862fea2a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2648 1952 a238ec19680d297363db8d02862fea2a.exe 28 PID 1952 wrote to memory of 2648 1952 a238ec19680d297363db8d02862fea2a.exe 28 PID 1952 wrote to memory of 2648 1952 a238ec19680d297363db8d02862fea2a.exe 28 PID 1952 wrote to memory of 2648 1952 a238ec19680d297363db8d02862fea2a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a238ec19680d297363db8d02862fea2a.exe"C:\Users\Admin\AppData\Local\Temp\a238ec19680d297363db8d02862fea2a.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Hgp..bat" > nul 2> nul2⤵
- Deletes itself
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5dbb830f1dffaeb71ec6ac2eef44bf196
SHA160fc5a0d44b9981a815e0c811bc094e40e87c062
SHA2560b426b6b10c01a26d13ac0738f24f199c5fc69d740acf48ee51c80db344fa755
SHA51286dbc6836c00000bef04d225aef88ca698fd83870d71c5b37cf07de99084d7d381e7d350737134993fdc37dfea68e14f1887c7dc7452907355634f65f19ae0cd