Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:09
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/Fiserv/ImageCopy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/Fiserv/ImageCopy.exe
Resource
win10v2004-20240508-en
General
-
Target
Device/HarddiskVolume3/Fiserv/ImageCopy.exe
-
Size
28KB
-
MD5
36d5b2653df91578cd982cb66bcccf8d
-
SHA1
29b9a4b8ae82368b76adf0faa3547afb297ff378
-
SHA256
4f23f13092f5838c054b4670ced88f785730c803b3a546762925c15f62a73958
-
SHA512
282df27df0674e97ab0b428bedd870147334292cfc1e86cb2dcb0f12b69aa8ec0db276ecd348c1cc8380179d4aa67f9e17b0577182d1491c6d8c30c5eee1ced1
-
SSDEEP
768:wRGuY2P0Vo6r7SiAwyrMRjbyUs1KJu4xlrggInbcuyD7UB:OPcVo6r7S/rab/zEkpg7nouy8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2172-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/2172-18-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
xcopy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ImageCopy.execmd.exedescription pid process target process PID 2172 wrote to memory of 2216 2172 ImageCopy.exe cmd.exe PID 2172 wrote to memory of 2216 2172 ImageCopy.exe cmd.exe PID 2172 wrote to memory of 2216 2172 ImageCopy.exe cmd.exe PID 2172 wrote to memory of 2216 2172 ImageCopy.exe cmd.exe PID 2216 wrote to memory of 2676 2216 cmd.exe xcopy.exe PID 2216 wrote to memory of 2676 2216 cmd.exe xcopy.exe PID 2216 wrote to memory of 2676 2216 cmd.exe xcopy.exe PID 2216 wrote to memory of 2676 2216 cmd.exe xcopy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Fiserv\ImageCopy.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Fiserv\ImageCopy.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\143C.tmp\ImageCopy.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\xcopy.exeXCOPY SampleImage.tif "C:\Users\Admin\AppData\Roaming\Fiserv\Alternatiff" /Y3⤵
- Enumerates system info in registry
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD533cbad841de1fa4137aec46e8626808b
SHA1b0dfa74096c6f15f366f555beee3f7d8b21d1f91
SHA256f12b9fda5c97cde1d4d1a254cf9ccee16d339270c95d0989da565695a6899abd
SHA51205c7b4e285b5652c02f9d0b2ed4f34431c1b86b8f65f07e60a3611941fb9316baa72b327ab302fb0ac5620dc93ef24624ce6edd382d6d86f7a0b2311453fa7a2