Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 21:05
Static task
static1
Behavioral task
behavioral1
Sample
373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe
Resource
win10v2004-20240508-en
General
-
Target
373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe
-
Size
46KB
-
MD5
9ad8e05b157ee5b2eba76f2e33aed805
-
SHA1
63939c7a1c997561853578b6f5b10fc583125f9f
-
SHA256
373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70
-
SHA512
18ef6f376f948e4a85fabba459c364e9e2fab1c91b13ca5def7fdc569487c358712f7a799f21864e91bea72b99dd79d42304b60f7dd8378254f353f89f5ecd49
-
SSDEEP
384:KK+fKfzsqud1lubAK0s2y5dro54fwDskc0ZqNMAJqd:f+fAQqud1lKAKmy5hL0BAJqd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 pytcw.exe -
Loads dropped DLL 2 IoCs
pid Process 1192 373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe 1192 373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3008 1192 373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe 28 PID 1192 wrote to memory of 3008 1192 373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe 28 PID 1192 wrote to memory of 3008 1192 373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe 28 PID 1192 wrote to memory of 3008 1192 373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe"C:\Users\Admin\AppData\Local\Temp\373fdb430fc00afee35361c9db71610d771fe52d6dc3566264615d083d29bf70.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\pytcw.exe"C:\Users\Admin\AppData\Local\Temp\pytcw.exe"2⤵
- Executes dropped EXE
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD5c5eb702d4862bc9b2852c02c8852d97c
SHA1824c665fff5aa1c18f73c25c99827503fdfe8a68
SHA2562966166a69d707abfe1421df052caa7f6b612cf614ef3cbba9986140f798f295
SHA5128e0785bc0d075dc1d73a0c72fe90816d6b208f1487c62aed9e8209980d278d1b59d35149c1281cc6d8e201b05cec77e46ebfc803ea07768942ce98047b6b2604