Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-03-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
c265062f9012942efb4cc71431c3252c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c265062f9012942efb4cc71431c3252c.exe
Resource
win10v2004-20240226-en
General
-
Target
c265062f9012942efb4cc71431c3252c.exe
-
Size
54KB
-
MD5
c265062f9012942efb4cc71431c3252c
-
SHA1
63b73f6c6648fb5aa3b331580b9d7bd9bfadcda8
-
SHA256
425f5c826645a86557fabfebd932f9baf59f6bfcd65fed2110eb5311e6f9c7e7
-
SHA512
692d137740520d3354ddd81f3019b5716ba345d091f3be34464ebd1c9da458244a4ece326ca363823dcaa2a305ad10b1ccb8d0fb60e9858bda0fed88c855d742
-
SSDEEP
768:yeJV08uVsgHgUDpiCqFYVO+1WlC1uxEtYk9cPWfuQdiHIWrwnvXv0wWE:LaCQDDpiC4uO+1lcytyPWfutwnEwWE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1272 1704 c265062f9012942efb4cc71431c3252c.exe 31 PID 1704 wrote to memory of 1272 1704 c265062f9012942efb4cc71431c3252c.exe 31 PID 1704 wrote to memory of 1272 1704 c265062f9012942efb4cc71431c3252c.exe 31 PID 1704 wrote to memory of 1272 1704 c265062f9012942efb4cc71431c3252c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c265062f9012942efb4cc71431c3252c.exe"C:\Users\Admin\AppData\Local\Temp\c265062f9012942efb4cc71431c3252c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\f_Mk_m_206.bat" "2⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\redload\1.bat3⤵PID:2504
-
C:\PROGRA~1\INTERN~1\iexplore.exeC:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?821334⤵PID:2264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
858B
MD5d727e34e3f5eb5ee1ce17fe4c66bf617
SHA1ea796e8b305510775d244f30758e125a01569626
SHA256d0cd1c2b674ee72b000ecacb181addd7735f4c3478731c23f4649e312e4c607d
SHA512ae3028364bf02b3e7c78d7a44a3305537c16d7feefb9dd968296b86425babaccee81af0c40eb7f8f374266df0e2c3c1a08b6b951ceaddc55572d6f0f1e85705c
-
Filesize
54B
MD5504490369970f1c0eb580afbcdf91618
SHA1b52f65cd538e6c998b2c7e3167f9c8e8fa6c7971
SHA256a13a0579286521f0d7cb55fc7d28c6d33f14c0573e9e69f7584fa4008a8e7d43
SHA5125495ce79abf0fc4ffbfaf9aefa484145f4e0d3e8457be0e2e4dfb1284fb5413016f2d9867e2386db5c4f7b51863bfffeae8ea6bd879053fdf6a928ab2a0857ad
-
Filesize
3KB
MD56d11d2a05e76338b23e505f2989c43d3
SHA1794748d878a88fd38345b667069da8a77308f79a
SHA256a4259c57a8824a89859bfa60fc9414fb9e83c7b74ddad19c5e44e6dbe08362a6
SHA51281acdadf4ef0fc14b7558ffda33650dd4a1bd7ea2de6c815c7f5a13be0c84c1e6507e8ee75e3d6188728f6720d169a42e8d1f1bf0b224282bad1c772a1aa85d0