Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 20:50
Behavioral task
behavioral1
Sample
b99ff04966b6415e7399710052da2765.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b99ff04966b6415e7399710052da2765.exe
Resource
win10v2004-20240226-en
General
-
Target
b99ff04966b6415e7399710052da2765.exe
-
Size
28KB
-
MD5
b99ff04966b6415e7399710052da2765
-
SHA1
456a799827450c4f340bf168d812070864a3ab31
-
SHA256
2657441a1cc569062fa12d0fd6387620d541fe11f82d757a4b1c5266fd2c5044
-
SHA512
2440952da0b3dad479fa9e66960083f4bf0bc6c6dac977599bd9e40f84e4eb623cfb18b62099732069515437663e8ca31aad6c8eb05b608f4bb249aac64df673
-
SSDEEP
768:RHgKGi+WLHxGRP6tQ7iXJsTppUg733ig0Gxk:ljD+WLHAl662+4BOx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 500 cmd.exe -
resource yara_rule behavioral1/memory/1916-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1916-2-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1916 wrote to memory of 500 1916 b99ff04966b6415e7399710052da2765.exe 28 PID 1916 wrote to memory of 500 1916 b99ff04966b6415e7399710052da2765.exe 28 PID 1916 wrote to memory of 500 1916 b99ff04966b6415e7399710052da2765.exe 28 PID 1916 wrote to memory of 500 1916 b99ff04966b6415e7399710052da2765.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b99ff04966b6415e7399710052da2765.exe"C:\Users\Admin\AppData\Local\Temp\b99ff04966b6415e7399710052da2765.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\a..bat" > nul 2> nul2⤵
- Deletes itself
PID:500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD562cce18eb609fc4917c861ce27c465f0
SHA14a3c7c86ee49a943ac13c2034363c18278ac80ca
SHA25693819a72cc58fcfb1edf4af425dbd4c69ed31a22a44f3338799cb73dfc6c92f0
SHA5121e0a30bd9fb19e9581d96d84f5908348229e151d1e7d3208022dc694d782e179b75aa789bd65d44e4776e057d77ad4e6f50ceb32f5460f1ca535880cd13d1787