Analysis

  • max time kernel
    161s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-03-2024 12:45

General

  • Target

    cb71be26311edbe7a472c7872a2d68a7.exe

  • Size

    22.3MB

  • MD5

    cb71be26311edbe7a472c7872a2d68a7

  • SHA1

    3034990ece31b3900db92c839eaa3e2696c609de

  • SHA256

    dfaeae1f066d027b94edd892b235ed7b2172e0210f8f4c69087accff97e9d962

  • SHA512

    39a564104e20fe8fad9a56bf27ce5d48f2765ac4c76985d8e77ea06500933ecd87593345cc1a8a4993fb93b2fdac8ea66677597488ee9cea86d988b1577f8176

  • SSDEEP

    393216:yvj5+N+ojACB7MnRjLWfCMy3UWWNKVcLRXkI0ii86Z7OSffARkXlUNgReiOMAwf4:y+nJKDdjcLkXOS8kXlUNgR3k5Z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb71be26311edbe7a472c7872a2d68a7.exe
    "C:\Users\Admin\AppData\Local\Temp\cb71be26311edbe7a472c7872a2d68a7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\INSB193.tmp
      C:\Users\Admin\AppData\Local\Temp\INSB193.tmp /SL C:\Users\Admin\AppData\Local\Temp\cb71be26311edbe7a472c7872a2d68a7.exe 23390257 68096
      2⤵
      • Executes dropped EXE
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\INSB193.tmp

    Filesize

    364KB

    MD5

    7059f9a01eeb4e9c54552bc6381e267a

    SHA1

    25a166014d67990363be4cf83317f1f0fc7df6e1

    SHA256

    e6472478dc5c5a1e4e3315b4ba7e43c66864e8fe437480a34d00489447706cdc

    SHA512

    c18eb70a9cf6cfc9066c7aa8a83955a67570f9e3e0d576d3dacd1cafc03131a723e2730d6deb24415b8c6d4fefad0b1184dbf8b3b16963f947a431b710e925df

  • memory/2696-10-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2832-9-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB