Analysis

  • max time kernel
    128s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/08/2023, 20:10

General

  • Target

    30b1542780d301e46d31ac62ed3b15a4e7efc5b353b1ba3905bbe9bd0721cbf9.exe

  • Size

    2.5MB

  • MD5

    ba9420c75eeb1125eba87fe73ae2976e

  • SHA1

    ef1ca675b59dd77a7f55954e0dcd21c595a4438b

  • SHA256

    30b1542780d301e46d31ac62ed3b15a4e7efc5b353b1ba3905bbe9bd0721cbf9

  • SHA512

    172f1f01fa679045add5c7fc52f73b1b6658ab8afcf1244f7d8c09e9c77f1b97ae202b70b5a14f82a3113dac209205af9d7ef21501640b83dfcc7040e4829d90

  • SSDEEP

    49152:mDkUrj1TeTWrEGfHqkFap78Qi6gGDUEGTuyFB/OSiRWmKrUp82Ze3Z09Lc:m4UVTE0vzap4QiqIBVdbsW5rL709Lc

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30b1542780d301e46d31ac62ed3b15a4e7efc5b353b1ba3905bbe9bd0721cbf9.exe
    "C:\Users\Admin\AppData\Local\Temp\30b1542780d301e46d31ac62ed3b15a4e7efc5b353b1ba3905bbe9bd0721cbf9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" 1QEPt1QY.SO -U -s
      2⤵
      • Loads dropped DLL
      PID:2916

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1QEPt1QY.SO

          Filesize

          2.3MB

          MD5

          68145a4162e09309de4a313f8c2a4508

          SHA1

          c23520e27e991559fa889839df7003865c512943

          SHA256

          59da85827b9b34ca1a795558dd0e4724be8ae17d1f074e08baebf6b9ea6549f7

          SHA512

          70dd735f1b15b5be3c0494915fcd386e355fcbaabec8c7e9d84bb0a9600087980e3d45daf8bf39985930bd148f4b0bd871300de6d32e35f44a4451bc61038721

        • \Users\Admin\AppData\Local\Temp\1QePt1QY.SO

          Filesize

          2.3MB

          MD5

          68145a4162e09309de4a313f8c2a4508

          SHA1

          c23520e27e991559fa889839df7003865c512943

          SHA256

          59da85827b9b34ca1a795558dd0e4724be8ae17d1f074e08baebf6b9ea6549f7

          SHA512

          70dd735f1b15b5be3c0494915fcd386e355fcbaabec8c7e9d84bb0a9600087980e3d45daf8bf39985930bd148f4b0bd871300de6d32e35f44a4451bc61038721

        • memory/2916-126-0x0000000004CC0000-0x0000000004CC6000-memory.dmp

          Filesize

          24KB

        • memory/2916-127-0x0000000000400000-0x000000000064D000-memory.dmp

          Filesize

          2.3MB

        • memory/2916-130-0x00000000051B0000-0x00000000052B1000-memory.dmp

          Filesize

          1.0MB

        • memory/2916-131-0x00000000052D0000-0x00000000053B9000-memory.dmp

          Filesize

          932KB

        • memory/2916-132-0x00000000052D0000-0x00000000053B9000-memory.dmp

          Filesize

          932KB

        • memory/2916-134-0x00000000052D0000-0x00000000053B9000-memory.dmp

          Filesize

          932KB

        • memory/2916-135-0x00000000052D0000-0x00000000053B9000-memory.dmp

          Filesize

          932KB