Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe
Resource
win10v2004-20240611-en
General
-
Target
64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe
-
Size
307KB
-
MD5
e00d1e8d9ad18ee37fec68b54b801bc6
-
SHA1
1a914ecf9e77e6f50b6900aca7d1f1a753fa70ef
-
SHA256
64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6
-
SHA512
22c76e88789d08d6b5a50d8a93c9f2dc0ea4120c413de40cdf9b6544cd78cd3bde953600cfb329e12dcfbb711c4531e679ce7a1de2b6c888b65466eecafce82f
-
SSDEEP
6144:SCGaECnpAoDO1A8dg3iTPJLMfgQZX+tJs0dxB:DGHCnaomAEg3uPdkgOX+tZdxB
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\K: mstsc.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\T: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\B: mstsc.exe File opened (read-only) \??\N: mstsc.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\W: mstsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2720 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2636 mstsc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2636 mstsc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2532 2940 64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe 28 PID 2940 wrote to memory of 2532 2940 64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe 28 PID 2940 wrote to memory of 2532 2940 64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe 28 PID 2940 wrote to memory of 2532 2940 64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe 28 PID 2532 wrote to memory of 2644 2532 cmd.exe 30 PID 2532 wrote to memory of 2644 2532 cmd.exe 30 PID 2532 wrote to memory of 2644 2532 cmd.exe 30 PID 2532 wrote to memory of 2644 2532 cmd.exe 30 PID 2532 wrote to memory of 2732 2532 cmd.exe 31 PID 2532 wrote to memory of 2732 2532 cmd.exe 31 PID 2532 wrote to memory of 2732 2532 cmd.exe 31 PID 2532 wrote to memory of 2732 2532 cmd.exe 31 PID 2532 wrote to memory of 2720 2532 cmd.exe 32 PID 2532 wrote to memory of 2720 2532 cmd.exe 32 PID 2532 wrote to memory of 2720 2532 cmd.exe 32 PID 2532 wrote to memory of 2720 2532 cmd.exe 32 PID 2732 wrote to memory of 2636 2732 mstsc.exe 33 PID 2732 wrote to memory of 2636 2732 mstsc.exe 33 PID 2732 wrote to memory of 2636 2732 mstsc.exe 33 PID 2732 wrote to memory of 2636 2732 mstsc.exe 33 PID 2532 wrote to memory of 2576 2532 cmd.exe 34 PID 2532 wrote to memory of 2576 2532 cmd.exe 34 PID 2532 wrote to memory of 2576 2532 cmd.exe 34 PID 2532 wrote to memory of 2576 2532 cmd.exe 34 PID 2532 wrote to memory of 2496 2532 cmd.exe 35 PID 2532 wrote to memory of 2496 2532 cmd.exe 35 PID 2532 wrote to memory of 2496 2532 cmd.exe 35 PID 2532 wrote to memory of 2496 2532 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe"C:\Users\Admin\AppData\Local\Temp\64f9efb81c175257251e257bd3ce866b3ca225eae74ed7a64ff20a5460a607d6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Login_V3.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmdkey.exeCmdkey /generic:termsrv/10.52.1.4 /user:bht\admin.bht /pass:Dr1vebayhub3⤵PID:2644
-
-
C:\Windows\SysWOW64\mstsc.exemstsc /v:10.52.1.43⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\mstsc.exemstsc /v:10.52.1.44⤵
- Enumerates connected drives
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
-
C:\Windows\SysWOW64\timeout.exeTimeout 33⤵
- Delays execution with timeout.exe
PID:2720
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /run /s 10.52.1.4 /u bht\admin.bht /p Dr1vebayhub /tn check_doc_owner_task3⤵PID:2576
-
-
C:\Windows\SysWOW64\cmdkey.exeCmdkey /delete:termsrv/10.52.1.43⤵PID:2496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD595452e87e6e7a446c8ed21d11a925e81
SHA1c31e9fca4af84127410252be452821fb17b3c46c
SHA2562a366cc0b61130e2f1867cf1145088e77dda4ca09fe3cc81d0ad5e9cccaa12c8
SHA5124898310664bad6a47b294b09d4c34c74b63c484853e95eaaeebb9f38192fcc759f8b0ba34d8e984fac0f0a4d1abf17836c413b44c56b75b2db0acc9a55ea7bd8