Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe
Resource
win10v2004-20240226-en
General
-
Target
be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe
-
Size
289KB
-
MD5
abebffab827f05fb44f8b40b23c15764
-
SHA1
a907312f51ac938af80cdbecf238c99147ad3208
-
SHA256
be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018
-
SHA512
07c101c70e05dfd6db8c2fe2780e8cfdb9be837f8bbb207636a863275a652008de0b423b3c1be6dd673d3c2421fac7a67e5ff21ae8d41702d1e30240b57e8859
-
SSDEEP
6144:9rYTgEMnRNL+I3YHBb/vMYRbbdfHKOkECzJLaQVbU5:BBrIdU8IOklJLJbU5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2268 CDMP.exe -
Loads dropped DLL 2 IoCs
pid Process 2068 cmd.exe 2068 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\CDMP.exe be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe File opened for modification C:\windows\SysWOW64\CDMP.exe be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe File created C:\windows\SysWOW64\CDMP.exe.bat be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe 2268 CDMP.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1716 be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe 1716 be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe 2268 CDMP.exe 2268 CDMP.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2068 1716 be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe 28 PID 1716 wrote to memory of 2068 1716 be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe 28 PID 1716 wrote to memory of 2068 1716 be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe 28 PID 1716 wrote to memory of 2068 1716 be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe 28 PID 2068 wrote to memory of 2268 2068 cmd.exe 30 PID 2068 wrote to memory of 2268 2068 cmd.exe 30 PID 2068 wrote to memory of 2268 2068 cmd.exe 30 PID 2068 wrote to memory of 2268 2068 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe"C:\Users\Admin\AppData\Local\Temp\be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\CDMP.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\windows\SysWOW64\CDMP.exeC:\windows\system32\CDMP.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289KB
MD557cb352c1bcbb495a3415bed9d23ab5b
SHA12e01d1f0569809fb3780a13980036efb77915a2d
SHA2567f0491c38b26f1c36aceba980f5e9c3765dd739d7db3505ef528f1ff5cc4106d
SHA512b5d9fac474f745441039ecb2c8e4c7e3b9f61eccb89b18989b2825af56e0a64b1baa190a82bfba50ec2d99e4d8605ab3c84f7aaf31c7222fa356e8af11ef86ab
-
Filesize
72B
MD5ce67253baa3d1efa086304ceac13baea
SHA1cddc1331dfba7d31e1176d328bb36c76461b2fa6
SHA25667e0e29621efe6101a86be391248e92b5960f514b425d61a2ca60ac423333957
SHA512a1891e5283d2004611911da10ea90d7b4ee10a9788595f7b7d19165f962b297988e0d8a1765397dc0762315486de8730f50b3252dbd225e179df93167a8175d9