Analysis
-
max time kernel
127s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 07:55
Static task
static1
Behavioral task
behavioral1
Sample
c81aa1f83960c6fc8ab4a92317458a7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c81aa1f83960c6fc8ab4a92317458a7c.exe
Resource
win10v2004-20240226-en
General
-
Target
c81aa1f83960c6fc8ab4a92317458a7c.exe
-
Size
19KB
-
MD5
c81aa1f83960c6fc8ab4a92317458a7c
-
SHA1
abcffbedd0f77135a7e270c6bd012160fc5d33ac
-
SHA256
37df0e98cbfc3c5aaa9f501acf2851a56b6b923f92988c5bb2c3a7655729781a
-
SHA512
3c6b4c66ed1865652833b86f8f4c90be16a8b7dd31ce04b10000cc6c7967b2e7e2aa491f3bb271da435bfa6c44bce3c15fd1bbf0f0c5c964b080a91af10debd3
-
SSDEEP
384:qK+pGLd/GYeBUXiRj/42Hxadm4eh/3UtOTw6jK32VqxctsEOIemulnfWjvOeo:qKjZ/6BeiRj/4QxakF9I2sxctNNejln
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1548 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl c81aa1f83960c6fc8ab4a92317458a7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" c81aa1f83960c6fc8ab4a92317458a7c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID c81aa1f83960c6fc8ab4a92317458a7c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2864 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 28 PID 2232 wrote to memory of 2864 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 28 PID 2232 wrote to memory of 2864 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 28 PID 2232 wrote to memory of 2864 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 28 PID 2232 wrote to memory of 1548 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 32 PID 2232 wrote to memory of 1548 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 32 PID 2232 wrote to memory of 1548 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 32 PID 2232 wrote to memory of 1548 2232 c81aa1f83960c6fc8ab4a92317458a7c.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c81aa1f83960c6fc8ab4a92317458a7c.exe"C:\Users\Admin\AppData\Local\Temp\c81aa1f83960c6fc8ab4a92317458a7c.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:2864
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵
- Deletes itself
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5d0cd6100329f517fc3aa6d869b046dba
SHA15c0547e360a2fc14e483127a2a28ca78d8fd8fb9
SHA256e67dc16455c0122e4fedd867f6e269f6318868d75c91a47f2e495a3c51baaf69
SHA5128e968bd4ea53f634c5ec0352340e1f3db4f68c970d08736110c311b9e472e8ccbaa83b8db84d7bfe368ae4142d7a059916286b945335809f910ae846162dcf7f