Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 18:19

General

  • Target

    a26f1a17dc83e9232d1368633cf65b72.exe

  • Size

    128KB

  • MD5

    a26f1a17dc83e9232d1368633cf65b72

  • SHA1

    c9d8ce03e055f6aeb3efbf6186bfc0337824e842

  • SHA256

    79e962de4c568619ff1666bf405d504dc0dccaabd88779df28e9b7d7e0df5476

  • SHA512

    55fd3c8789d82539e73f21bb53c9a7f06dc99d7dec79ced1605a6cbf5d601d576895cd42261cd4eaa6412a6faa62e731ae749df898ba284856307972c54e39ea

  • SSDEEP

    3072:l4y7k+gk7Ye4Kz0wuS8EaodfxAcYlFrb2lTk1uHxR+TEAnGScQ:l46/WqzEQMlWk1rTEAn

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a26f1a17dc83e9232d1368633cf65b72.exe
    "C:\Users\Admin\AppData\Local\Temp\a26f1a17dc83e9232d1368633cf65b72.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Xjb..bat" > nul 2> nul
      2⤵
      • Deletes itself
      PID:2700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Xjb..bat

          Filesize

          210B

          MD5

          f2ddc11435eb2d4f4de38bcf62b31218

          SHA1

          e2952ff434b6a822e33302085698755c4e337ce2

          SHA256

          cfeec51404bc5d5234b797add15de3f9df1766ebb140682f330ab85977dbc7f2

          SHA512

          4e71904dc1e7681d29b16c6a832d32ae4243bc5aa8a091bdef2fe08899957df87dc84fd7dcbcbf950f9d6a1387a28eb6acecb43e9215528447fa8fb33ee899ca

        • memory/1176-0-0x0000000000120000-0x0000000000136000-memory.dmp

          Filesize

          88KB

        • memory/1176-1-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1176-2-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1176-3-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB

        • memory/1176-5-0x0000000000400000-0x0000000000423000-memory.dmp

          Filesize

          140KB