Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
output.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
output.exe
Resource
win10v2004-20240508-en
General
-
Target
output.exe
-
Size
3.4MB
-
MD5
d595183a63c7ee731bb94281cb6ab811
-
SHA1
7485071a41c430effd8fa3882c39150d105b8194
-
SHA256
33495950570e4cc1430d028a03b23a195f831c33a9ca452884e9328e29ae5449
-
SHA512
c8a63d6bbe35181bcad95ca1027dc736ee397f4894f95284138a8a5d389262a200172c23f48844ecba432e5e52627135c4bec08bd76932478aac302373ea7081
-
SSDEEP
3072:Ip9g+u38plam6rkn3IQkpLyw74bMPntr+w:Ip9tuolakn4QW2wcbM9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2732 wrote to memory of 2928 2732 output.exe 29 PID 2732 wrote to memory of 2928 2732 output.exe 29 PID 2732 wrote to memory of 2928 2732 output.exe 29
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5db54e47922f242fe569f467b3b0e723a
SHA1adaa66105a09bb0d22a911f0837e854c6487ee10
SHA25634dfc7334ab60aa7e2479716cf540720cbddba16a0237797f7291dd50d0b5902
SHA51277b07d25b27dde236959ce64ef971734ddbcbbfb99474372042843501df412b98f76e2d9fc489e720118cdcb0bb8f994e8d5c06c8b6c752ae061cf94188084d9