Analysis

  • max time kernel
    127s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 17:00

General

  • Target

    b7e9fd6b210b0e4aba15cfffec265a3f.exe

  • Size

    19KB

  • MD5

    b7e9fd6b210b0e4aba15cfffec265a3f

  • SHA1

    618566e5042bfdc65aa848afafff243ff256a0a3

  • SHA256

    d9f2310980cc89adf2bfd259b5bb62b66c90d4e2b23353f5b351d71be8470583

  • SHA512

    788b7a6e93490452cbccd8f4df91b0154abf126a98e06913eb3edacdea514ea93cce1483bd8420da37f08126034f190189febb9683037a39b641bb9e01b1c94a

  • SSDEEP

    384:ySf7F7Ga/1oRGvuZn4wqVd3EjK3moSV7W+cCM8Kt1ulnfWjvOeo:7Z71CRUPEInShW+crBtoln

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7e9fd6b210b0e4aba15cfffec265a3f.exe
    "C:\Users\Admin\AppData\Local\Temp\b7e9fd6b210b0e4aba15cfffec265a3f.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\SysWOW64\ctfmon.exe
      ctfmon.exe
      2⤵
        PID:2360
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "
        2⤵
        • Deletes itself
        PID:324

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\awer0.bat

            Filesize

            274B

            MD5

            7de9caf567c5c680db6c2d3ef9ef7fe1

            SHA1

            18ccf732a1bbe35cbf09944b65021928c9c50c11

            SHA256

            f784be461d98a6ad306e7bf77cd539a296abe3d37594680bb002a7bb78d16205

            SHA512

            c2c559b2bb31b7296c68ff9143fbc41b5d6aca67bdc76b61e16edec6ad3d85ec8b4fa471fb278d5dade5871e85d5b55bb3f93aa24ac3a1d452cdf131be5d5f44