Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:17

General

  • Target

    df43aaf53cf823766f98d138827f3931.exe

  • Size

    8KB

  • MD5

    df43aaf53cf823766f98d138827f3931

  • SHA1

    371d4384bcf0098c3decca695268d4255f3b87bf

  • SHA256

    b851b7e9300924a6af5e9030c320a442cf65cd5276d216aadf114ae1737d8b38

  • SHA512

    4b187c397a23fd1c8395b27620ebd30ac8336bf0b75a400bfb718a8c1368654f83c84e6564d0b4f8661c8f01529b5935bfee6a2d0a9bf4a29b4283be99a0892d

  • SSDEEP

    96:E2YjX/R8Dn4qwuK/ncVqZ790AvKn6riLNQ+e3q5dNtosZ2Y843TWVWe16GRlLtfW:GjmDn+nAK9/vkvWHqzL3aVPDR9Nin

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df43aaf53cf823766f98d138827f3931.exe
    "C:\Users\Admin\AppData\Local\Temp\df43aaf53cf823766f98d138827f3931.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\System32\cscript.exe
      "C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Tempvermin.vbs
      2⤵
      • Blocklisted process makes network request
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Tempvermin.vbs

    Filesize

    1022B

    MD5

    be0465d478d6de4f33444a26c817f3c0

    SHA1

    a36cf4f4f7e31317ce3c99c8cb01b6ec312618e4

    SHA256

    22969b4b10e73229da4d65b1481c00950b1167d50269d60d9c2bab0dac74ea14

    SHA512

    d57eb272c2fe5a64009b171fdaa31c37f806ecb35eab931e0a9ce1a4deb1a860ef50a3e48c6d943b716d7f007fd0959bf0eb9047faed9e861d863bc0a0ff3b0a

  • memory/2204-0-0x000007FEF5023000-0x000007FEF5024000-memory.dmp

    Filesize

    4KB

  • memory/2204-1-0x00000000011B0000-0x00000000011B8000-memory.dmp

    Filesize

    32KB

  • memory/2204-4-0x000007FEF5023000-0x000007FEF5024000-memory.dmp

    Filesize

    4KB