Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe
Resource
win10v2004-20240508-en
General
-
Target
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe
-
Size
386KB
-
MD5
f9bb6ef02f29f52ff126279ff7d044bb
-
SHA1
5b68f1745d92d32a1e64ef3ace6640c5fbfeb254
-
SHA256
2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8
-
SHA512
86a6c71dca30b5a6dc54cdc262318bbae1f16ba5f3e701d6d84adf8ddda265d178ddf7b72753e491a46d4fe043c2b7f9919f1be25a6f4fa0bc72ad193b0ca153
-
SSDEEP
3072:H1sSJApTSnQU/x0ImhuDzHfs4zbYOjujDRfygDgKQINXLLHIaKlay8weCycJ5DfS:H1sSmRIt/xhtsOju1DH5NXnIKAc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2848 Svchost.exe 1812 System32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2848 2332 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 28 PID 2332 wrote to memory of 2848 2332 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 28 PID 2332 wrote to memory of 2848 2332 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 28 PID 2332 wrote to memory of 1812 2332 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 29 PID 2332 wrote to memory of 1812 2332 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 29 PID 2332 wrote to memory of 1812 2332 2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe 29 PID 1812 wrote to memory of 2616 1812 System32.exe 30 PID 1812 wrote to memory of 2616 1812 System32.exe 30 PID 1812 wrote to memory of 2616 1812 System32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe"C:\Users\Admin\AppData\Local\Temp\2f175dac5c8571e586722f6927b0112af22637a17efb3acfd78e813a804a38f8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\ProgramData\Svchost.exe"C:\ProgramData\Svchost.exe"2⤵
- Executes dropped EXE
PID:2848
-
-
C:\ProgramData\System32.exe"C:\ProgramData\System32.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1812 -s 5203⤵PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
326KB
MD5a844ac745a4005fbd3f51d79ff88583c
SHA192671774fd4be9781a77d2788a8dddbf8981ead5
SHA25674fe1a6a1e36be7d893e31bbb4d4bd83bf4b927e715276cd5607982139818ebd
SHA5125f0734058d9146ffeb552abf443df5097cf134a4737bed499467830e08d97f5d1996c1f1647c5c12289ca4d4209effd480010afebc59d50290d4ca7d45bb41f8
-
Filesize
330KB
MD5bdd3d30ea4bc94d1240ea75f1aa212eb
SHA1f994ffb94690263047c5227cc8b65d3ab3345ba7
SHA25600b7a0f1b18c5dd1f4d469a8c6997198fd7f471e94d6a6ba70d79fd165f44888
SHA5123a039b360581d7d2204dfff546d08b2a5ec36d78f9572730d9a707fe35925c8451d505fbb19f9c9d9861f3e5aea9ae4b52ae0031e109721d57f55a62b1b691b8
-
Filesize
51KB
MD5f52616c47b243f3373248ed2a5f49e1c
SHA1d601cad06d6ccb0e52dabe8d34ae5f1cfd463000
SHA2563b24abf5671a93c15eca052fd28555e561dfe625962b2dbe733d7f717467a3a8
SHA5129435df5be1594667eaa988115b8d712abb0766e0e90330d2fa99ce76cfdc6272cb65a6c922278bb265c8e2127e755f5aadbfa2481ee009f105ff222d12f07cc0