Analysis
-
max time kernel
126s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240412-en
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
4d08af475012207281e72894a09dde3b
-
SHA1
660addb2bb6e25b734892ff6b4b55f5ee412f7a0
-
SHA256
d00b96985ef370d873d5028611c31f1eac1f858347bf1c6982b3bb9e05626f3e
-
SHA512
bbb1000b340e2c94d7444dd7162cf53d0526fa9f10c50367f21b17c12e196ba0f993b373be909dc66c5894e5f75f61e57f2bf9bde341f777008b1fa77a232f5b
-
SSDEEP
24576:C/bW5bWpIFLX5ewNIFLX5ncTqTwBCY8K67FWV3G7X2/pk52pQ:C6IO5ewy5cawBCVls82/pk52p
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2372 tmp.exe 2372 tmp.exe 2216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2372 tmp.exe Token: SeDebugPrivilege 2216 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2216 2372 tmp.exe 28 PID 2372 wrote to memory of 2216 2372 tmp.exe 28 PID 2372 wrote to memory of 2216 2372 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169B
MD5f260d997847031123b867315e786a3d6
SHA1615bbfa05aa7eb9ae9fe02ebf757265d76a08a5a
SHA25626c9afc6ec388c82deb202d2fdb8851eb5a1f8c612d134f7d930ddc78f59a60b
SHA512a8fc78cd1d98dba42710bb2fc4a6678957dc0d90c9d7b3a6856b0c4ed833b49cd720e4cc8991a37fbcff0a79beb2254bbbbdf3a513c9a1e153d47f837c94e579