Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:23
Static task
static1
Behavioral task
behavioral1
Sample
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat
Resource
win10v2004-20241007-en
General
-
Target
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat
-
Size
395B
-
MD5
21138c5f0fc42e27b57cbadc4cfcb7b7
-
SHA1
ebc7fb05fd67b43925ec4ee2a43a2f3152712b28
-
SHA256
c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23
-
SHA512
20d832e675d2aab97df7fc10bad055f96327f782224c0a1c0f10c4d7cf01ccc7428ab934da889935c2e67d6fac959c1f52d796314988168844c5f079b55d67f1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2988 2976 cmd.exe 31 PID 2976 wrote to memory of 2988 2976 cmd.exe 31 PID 2976 wrote to memory of 2988 2976 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\c8d896d8dae872d0ff7ed407e9706e19f798fbadba7af7ef48e5edda4bf05c23.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\xcopy.exexcopy /Y /I /S "C:\Users\Admin\AppData\Local\Temp\*" "C:\Users\Admin\AppData\Roaming\fat\"2⤵PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\fat\scoped_dir2144_1522578766\4bc34ff4-86c6-460c-933f-6d5d2d21cc68.tmp
Filesize88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
C:\Users\Admin\AppData\Roaming\fat\scoped_dir2144_867501076\d6cbde45-4292-4b92-ac5a-f95b65e357bf.tmp
Filesize242KB
MD5541f52e24fe1ef9f8e12377a6ccae0c0
SHA1189898bb2dcae7d5a6057bc2d98b8b450afaebb6
SHA25681e3a4d43a73699e1b7781723f56b8717175c536685c5450122b30789464ad82
SHA512d779d78a15c5efca51ebd6b96a7ccb6d718741bdf7d9a37f53b2eb4b98aa1a78bc4cfa57d6e763aab97276c8f9088940ac0476690d4d46023ff4bf52f3326c88