Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 17:21
Behavioral task
behavioral1
Sample
chall.vhd
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
chall.vhd
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
out.vhd
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
out.vhd
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
out.img
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
out.img
Resource
win10v2004-20240426-en
General
-
Target
out.img
-
Size
100.0MB
-
MD5
8a87186e27ac2c1174937a7391fabf69
-
SHA1
96c0a3d306ecb39f8287b8ac4f5a5e460a6318be
-
SHA256
38541ec0f154934396e60887d19ffc12422be34669bd1c61d06f51e7a2ebeca0
-
SHA512
1de3cb8c47a0729806330df97d216ff0c215eae68b5159079fb9fbfc036c348422f7db32148f6b9b588799b2437c0288065dbf3bbdc6f99827771cd14ee64e40
-
SSDEEP
1572864:3MKNFm87Eq9W3ZWTWI4H2Iwf5HR6hICAOWXT2hdw+Yz69x3mv5bCVW:tTwm5HmICAOsedw+Yz6shbC
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3004 2060 cmd.exe 29 PID 2060 wrote to memory of 3004 2060 cmd.exe 29 PID 2060 wrote to memory of 3004 2060 cmd.exe 29