Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
Destroyer Virus USB.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Destroyer Virus USB.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Visita gmzwebmaster.es.url
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Visita gmzwebmaster.es.url
Resource
win10v2004-20240709-en
General
-
Target
Destroyer Virus USB.exe
-
Size
117KB
-
MD5
5958d294baf9c137e5f47d4aabcf5d4c
-
SHA1
de92d8f9bb58fbd3aed359c8c1db0e182302e341
-
SHA256
72ecf16f64695ff76b146d8ed148860af98bbf5014c630be7a24c78372ebfa68
-
SHA512
c5cd4647375dad06fea4133f9e5e411e9e3ad02be5d98a1b580046a590f55cc28e4f25cc4fb1cee04e8d7765f3b3ad2d3c068add7c8caa1563eabe73d54fb376
-
SSDEEP
1536:VQQ2aTmzPfYPZrk5SORqgNAPkL+Z2AQt2x99sUXvqvLGzZbndcThU:VQQ2aS7udiXqgNU++Z2F2x99PfN7ChU
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 224 3688 Destroyer Virus USB.exe 84 PID 3688 wrote to memory of 224 3688 Destroyer Virus USB.exe 84 PID 3688 wrote to memory of 224 3688 Destroyer Virus USB.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Destroyer Virus USB.exe"C:\Users\Admin\AppData\Local\Temp\Destroyer Virus USB.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\~5CC6.bat "C:\Users\Admin\AppData\Local\Temp\Destroyer Virus USB.exe"2⤵PID:224
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5fd6a18fb5c33b8047011e8c48e983cd3
SHA172ab6bf5be2ba4405e6ef52bcb9584ee8120fe91
SHA256c85a105e29c7cb3cc612d5eefb17a261ad8e326be8138d1808311bdca193706f
SHA51273d8bc447074f9510f247200c6b894664149ca394c47618742afae381cf44a01727407200cdeb04ae4650260df95232d1b8bf32b8c24037fd4ec0f31499c86e3