Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe
Resource
win10v2004-20240426-en
General
-
Target
12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe
-
Size
6.6MB
-
MD5
64f3e14650cfa8ad34d2bf90cd41e082
-
SHA1
0d82a34f554342d30bea3fa21ebd7ec8e1fc395c
-
SHA256
12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691
-
SHA512
dd136047e2c33b42a72bffa39d280ab63f6b189368bc6b6ff8475731c517d644c6ccd4ae4a8f30c54ad28f9db69838b70c1a4a195dc0b66f47d09f2e0c692161
-
SSDEEP
98304:uCSa4v3dAm8U5ipZ1G7aLxZf1w51p6LDCv4olr4yWWsfTjyJmMoEKQpogf2D:ula4/N8BpmCDf251Xv4oNn6/yprp3S
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
hcbnaf.exepid process 2700 hcbnaf.exe -
Loads dropped DLL 1 IoCs
Processes:
12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exepid process 1888 12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exehcbnaf.exepid process 1888 12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe 2700 hcbnaf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exedescription pid process target process PID 1888 wrote to memory of 2700 1888 12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe hcbnaf.exe PID 1888 wrote to memory of 2700 1888 12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe hcbnaf.exe PID 1888 wrote to memory of 2700 1888 12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe hcbnaf.exe PID 1888 wrote to memory of 2700 1888 12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe hcbnaf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe"C:\Users\Admin\AppData\Local\Temp\12f0f76abdf6223e604587f961c1aa9a5d423c38f2f807bc42b148861414c691.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe"C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5a3faec8c1e2ad37cb0ac0578ac5609f9
SHA175337d7da130f66ffe9f597e331a8691428a3176
SHA256d20b7bd8e4b275450dbec5c7cf5f6a961702723ae1a8bd44469a9d74ca88c420
SHA512dddd0f7748edca06cc7b35e7e38a891b2b67f40333b0731746e0f981d385d77cf1e409e77510809563a9cb96216e0a6a439fb62c430b1ccb72a5f188c58cf4a7