Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe
Resource
win10v2004-20240426-en
General
-
Target
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe
-
Size
8.7MB
-
MD5
6035e539b2ba7937da9b714466520f93
-
SHA1
39ca0887952cd570a7a6a7928b7f8f62df635a24
-
SHA256
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a
-
SHA512
d5fb89e91a5dd4635371d5f7d6bde0b75ff92570c08c20ddc9cb58dd69f30bedc3fdc500ea6c23896350beef02efa172bed144498ea94acf24ecaaf68db51cd1
-
SSDEEP
196608:hCbGPZmVfjsCbGPZmVfjiCbGPZmVfjsCbGPZmVfj2CbGPZmVfjsCbGPZmVfjiCbI:0GmVNGmVrGmVNGmVnGmVNGmVrGmVNGmE
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\2 = "C:\\ProgramData\\winmgr107.exe" 60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
Processes:
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe:Zone.Identifier:$DATA 60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exepid process 2156 60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.execmd.exedescription pid process target process PID 2156 wrote to memory of 2268 2156 60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe cmd.exe PID 2156 wrote to memory of 2268 2156 60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe cmd.exe PID 2156 wrote to memory of 2268 2156 60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe cmd.exe PID 2156 wrote to memory of 2268 2156 60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe cmd.exe PID 2268 wrote to memory of 2172 2268 cmd.exe NOTEPAD.EXE PID 2268 wrote to memory of 2172 2268 cmd.exe NOTEPAD.EXE PID 2268 wrote to memory of 2172 2268 cmd.exe NOTEPAD.EXE PID 2268 wrote to memory of 2172 2268 cmd.exe NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe"C:\Users\Admin\AppData\Local\Temp\60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe"1⤵
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start C:\PROGRA~3\60D439~1.TXT2⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\PROGRA~3\60d439364a0e029c08df2c5c99fa16e13a078f21b8ef53346f013196e831d06a.exe.txt3⤵PID:2172
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
992B
MD5c8cf7247d4cfc99a7582a42d13df4c08
SHA1317f5588af0b3b6374c436fb00084c522fd78a83
SHA25678bd99781e971622f1573bccf2ae9cdd7a7498cf81c1875afc65913e1083b1d0
SHA5125dd86b7ba388e5d2ad61b1c69589f42c36eec23a04b3cece0941133e0cf0e8a6f1f3aa2242d87af72db725b4b96032dadae72b3be98af3cfce5786ad8c08c357