Analysis
-
max time kernel
161s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
cb71be26311edbe7a472c7872a2d68a7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb71be26311edbe7a472c7872a2d68a7.exe
Resource
win10v2004-20240226-en
General
-
Target
cb71be26311edbe7a472c7872a2d68a7.exe
-
Size
22.3MB
-
MD5
cb71be26311edbe7a472c7872a2d68a7
-
SHA1
3034990ece31b3900db92c839eaa3e2696c609de
-
SHA256
dfaeae1f066d027b94edd892b235ed7b2172e0210f8f4c69087accff97e9d962
-
SHA512
39a564104e20fe8fad9a56bf27ce5d48f2765ac4c76985d8e77ea06500933ecd87593345cc1a8a4993fb93b2fdac8ea66677597488ee9cea86d988b1577f8176
-
SSDEEP
393216:yvj5+N+ojACB7MnRjLWfCMy3UWWNKVcLRXkI0ii86Z7OSffARkXlUNgReiOMAwf4:y+nJKDdjcLkXOS8kXlUNgR3k5Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2696 INSB193.tmp -
Loads dropped DLL 2 IoCs
pid Process 2832 cb71be26311edbe7a472c7872a2d68a7.exe 2832 cb71be26311edbe7a472c7872a2d68a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2696 2832 cb71be26311edbe7a472c7872a2d68a7.exe 27 PID 2832 wrote to memory of 2696 2832 cb71be26311edbe7a472c7872a2d68a7.exe 27 PID 2832 wrote to memory of 2696 2832 cb71be26311edbe7a472c7872a2d68a7.exe 27 PID 2832 wrote to memory of 2696 2832 cb71be26311edbe7a472c7872a2d68a7.exe 27 PID 2832 wrote to memory of 2696 2832 cb71be26311edbe7a472c7872a2d68a7.exe 27 PID 2832 wrote to memory of 2696 2832 cb71be26311edbe7a472c7872a2d68a7.exe 27 PID 2832 wrote to memory of 2696 2832 cb71be26311edbe7a472c7872a2d68a7.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb71be26311edbe7a472c7872a2d68a7.exe"C:\Users\Admin\AppData\Local\Temp\cb71be26311edbe7a472c7872a2d68a7.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\INSB193.tmpC:\Users\Admin\AppData\Local\Temp\INSB193.tmp /SL C:\Users\Admin\AppData\Local\Temp\cb71be26311edbe7a472c7872a2d68a7.exe 23390257 680962⤵
- Executes dropped EXE
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD57059f9a01eeb4e9c54552bc6381e267a
SHA125a166014d67990363be4cf83317f1f0fc7df6e1
SHA256e6472478dc5c5a1e4e3315b4ba7e43c66864e8fe437480a34d00489447706cdc
SHA512c18eb70a9cf6cfc9066c7aa8a83955a67570f9e3e0d576d3dacd1cafc03131a723e2730d6deb24415b8c6d4fefad0b1184dbf8b3b16963f947a431b710e925df