Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe
Resource
win10v2004-20240704-en
General
-
Target
de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe
-
Size
384KB
-
MD5
ff8e69d8d611ed64251f1ba5a969ea2c
-
SHA1
a12775ea177ea1f4a257d79d17a5df34ac10dbf0
-
SHA256
de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd
-
SHA512
05b9da218ffa84f7732619bb3eab627210702c0d9141fd2390f97c677635455b0fbc8ba22cb0fe2e25cc2a16fc169e3f994ed834e44d0c096dece8737ff653ec
-
SSDEEP
6144:ZDqdVdWDHU1t/hBcJ9ENDEsCkEjiPISUOgW9X+hOGzC/NM:ZDqdHYSt/hB0qQkmZzcukG2/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 INATC.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\windows\INATC.exe de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe File opened for modification C:\windows\INATC.exe de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe File created C:\windows\INATC.exe.bat de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2144 de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe 2796 INATC.exe 2796 INATC.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2144 de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe 2144 de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe 2796 INATC.exe 2796 INATC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2760 2144 de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe 30 PID 2144 wrote to memory of 2760 2144 de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe 30 PID 2144 wrote to memory of 2760 2144 de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe 30 PID 2144 wrote to memory of 2760 2144 de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe 30 PID 2760 wrote to memory of 2796 2760 cmd.exe 32 PID 2760 wrote to memory of 2796 2760 cmd.exe 32 PID 2760 wrote to memory of 2796 2760 cmd.exe 32 PID 2760 wrote to memory of 2796 2760 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe"C:\Users\Admin\AppData\Local\Temp\de46ccaee070561b6ae8b94739e2ae09e473c73d5deeb1730535e9d385c7f3cd.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\INATC.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\windows\INATC.exeC:\windows\INATC.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD5ff1c59b1b0df36449a48c559dec39106
SHA1ec3f743422ce7ea85b25b4f7cfd5cc6b916ad122
SHA256d4293d80b0621abe4083e539bdc81077a1096013f5e43e3b4012a883e7bba368
SHA51293f5405d090db8dfd5f2862f120b28fa6b61af9c1b655f9af9f75d538496b7f9f9f76e444ab2c01dc6e84fca7f625fbb31e63f2cf484c078625e18d38f6fbb73
-
Filesize
384KB
MD586e5d83cf68adf20f78b2a201974e10d
SHA1d155c0d5b55a4d36c0051a26ccb4ec49a3dcc617
SHA256c85b79cf6cf61e7140485f3a7e57944a6116585c61055d5e55517c16bc339b0e
SHA5120f0fc8dd57f5452ecfa6d93a473f0c1982a8f4652f956921f72cd2fa2292a031a1195b083eff0d4c013d53dfb1145c268586547204760eca494cf86245d2c986