Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 00:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b61532c877febbec650d4fe2124ae2b1.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b61532c877febbec650d4fe2124ae2b1.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
b61532c877febbec650d4fe2124ae2b1.exe
-
Size
72KB
-
MD5
b61532c877febbec650d4fe2124ae2b1
-
SHA1
93def4c1f6558ec39f04830e51811a43c6c55165
-
SHA256
29f8297624043d16b2f334ea54dbd2f1e05cb932402cc563696e8e6c7cf20fe2
-
SHA512
19e7d88fbb9baf7cb47b991ea84a71fe8fa1be7544c2a522c96b74ed540871eb9f27e8b263a970850038f9fce9a77ae19d58c297c864b3207bc008b3956d7bc8
-
SSDEEP
1536:b80XoQrcDOZckmHDP30n2PtSqyWOInCqFXqWhdRwGWmxoIzvsa7/W:bVjmjPXtcIBaWXWkoovsa7/W
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 992 wrote to memory of 2472 992 b61532c877febbec650d4fe2124ae2b1.exe 91 PID 992 wrote to memory of 2472 992 b61532c877febbec650d4fe2124ae2b1.exe 91 PID 992 wrote to memory of 2472 992 b61532c877febbec650d4fe2124ae2b1.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\b61532c877febbec650d4fe2124ae2b1.exe"C:\Users\Admin\AppData\Local\Temp\b61532c877febbec650d4fe2124ae2b1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\b61532c877febbec650d4fe2124ae2b1.exe"C:\Users\Admin\AppData\Local\Temp\b61532c877febbec650d4fe2124ae2b1.exe"2⤵PID:2472
-