Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
abb00926303849c50b39119ce57bf145.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abb00926303849c50b39119ce57bf145.exe
Resource
win10v2004-20240226-en
General
-
Target
abb00926303849c50b39119ce57bf145.exe
-
Size
179KB
-
MD5
abb00926303849c50b39119ce57bf145
-
SHA1
16f8b507ea22c87d05bc725ae19dba70daadd046
-
SHA256
4fba53e5baabd67f66c772c9d78a34103fce93b4474d37de56c6271a50ac2a0e
-
SHA512
864dc6c4bc9415594439af18cc546858ffbb367f06be036782d261cebf6e043983ac80626b81564e7043eb8917e757ad63521108658d955e3c71c285aa06d0b6
-
SSDEEP
3072:MRCcfK0iGLER5uGj4DfruEx0bp19AQTXIdwuD:MOlR5D4DjuFbp19AQTXIdD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2024 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 abb00926303849c50b39119ce57bf145.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2024 2192 abb00926303849c50b39119ce57bf145.exe 28 PID 2192 wrote to memory of 2024 2192 abb00926303849c50b39119ce57bf145.exe 28 PID 2192 wrote to memory of 2024 2192 abb00926303849c50b39119ce57bf145.exe 28 PID 2192 wrote to memory of 2024 2192 abb00926303849c50b39119ce57bf145.exe 28 PID 2192 wrote to memory of 2024 2192 abb00926303849c50b39119ce57bf145.exe 28 PID 2192 wrote to memory of 2024 2192 abb00926303849c50b39119ce57bf145.exe 28 PID 2192 wrote to memory of 2024 2192 abb00926303849c50b39119ce57bf145.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\abb00926303849c50b39119ce57bf145.exe"C:\Users\Admin\AppData\Local\Temp\abb00926303849c50b39119ce57bf145.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Lzj..bat" > nul 2> nul2⤵
- Deletes itself
PID:2024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD558ffa3eda9a12e059519835c53de2713
SHA134f8d4a48f6a774a80b059bafed903ec1a13c775
SHA256adbc437b9db8085609ba5fd74365e865c71fd7f2a4498694e63307170c0fe12f
SHA512dac87ef3dbdf4fc2c6f967191de1fd77a10ec19d4dcb33c22c042420a83edf1edd5825f34315265bea048e543def3478d8636c8d121a7314974eb3a6cad03594