Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 05:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
baa14892eaaa0ef610fb3c1349529d61.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
baa14892eaaa0ef610fb3c1349529d61.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
baa14892eaaa0ef610fb3c1349529d61.exe
-
Size
33KB
-
MD5
baa14892eaaa0ef610fb3c1349529d61
-
SHA1
53b7eb9c9b6f40d9f3b3bd65f8d6213164645f14
-
SHA256
8d8a2f05c6cd7cf8887f7f434eedc5cf9338afd5bf40eaf321f1575ef9a86cd8
-
SHA512
b0b9d0ae1a6990c320f42ea5536e8b867cd80b1ddaf59efda357662cd753278d28addc768fbfca034555cea4c85dbb1f7f215af656d60da66d3ca6e5eaabfd55
-
SSDEEP
768:7ttttttttttMlryFstI/1qwya/HB5Jbn6ioaORAgpm/K4SbtkpDzNp/:INU4Ja/h5JbXORmSbtkND
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2404 cmd.exe -
resource yara_rule behavioral1/memory/1664-1-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1664 baa14892eaaa0ef610fb3c1349529d61.exe 1664 baa14892eaaa0ef610fb3c1349529d61.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1664 baa14892eaaa0ef610fb3c1349529d61.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2404 1664 baa14892eaaa0ef610fb3c1349529d61.exe 29 PID 1664 wrote to memory of 2404 1664 baa14892eaaa0ef610fb3c1349529d61.exe 29 PID 1664 wrote to memory of 2404 1664 baa14892eaaa0ef610fb3c1349529d61.exe 29 PID 1664 wrote to memory of 2404 1664 baa14892eaaa0ef610fb3c1349529d61.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\baa14892eaaa0ef610fb3c1349529d61.exe"C:\Users\Admin\AppData\Local\Temp\baa14892eaaa0ef610fb3c1349529d61.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BAA148~1.EXE > nul2⤵
- Deletes itself
PID:2404
-