Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2023, 19:02

General

  • Target

    2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe

  • Size

    13.8MB

  • MD5

    0f8a23c8d5161d83797f37e682304edd

  • SHA1

    d78c78d935f28c6bc4afc6e39c44a77097160e5d

  • SHA256

    2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2

  • SHA512

    fc30e8d0a88656c5cbc96f489eb0f3863f0afdc149b41c7f7614ac3498910b975d11144f7c38428064cc42764f6e25ba8b2b7143768da9d53c2d6dfcbd4a557e

  • SSDEEP

    393216:aysSKFHl4H+5LBX+YMfSROa75dU69mPQt8vSH6Mlt:dst4H+5VNm8/U6cPQtU43t

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe
    "C:\Users\Admin\AppData\Local\Temp\2cc54f8b602728dfd1818f0c651e605e60b02f7f2e89d06f4f59c02a328207e2.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c copy /b C:\Users\Admin\AppData\Local\Temp\ÄþÈñÔóMHRah9922.exe + C:\Users\Admin\AppData\Local\Temp\ÐÞ¸ÄÓÃ.txt C:\Users\Admin\AppData\Local\Temp\ÄþÈñÔóMHRah9922.exe
      2⤵
        PID:2236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ÄþÈñÔóMHRah9922.exe

      Filesize

      13.8MB

      MD5

      65700d9c246ae5e2cfbcb0e84c158e10

      SHA1

      c2bd0584712402689d57a1bb24683e96aa9834d3

      SHA256

      bfb8bcbdc684c6cc0cfdda2e80a7c8d52c374c6e01d26ad2c20707200fecec7b

      SHA512

      0e44dfc582b1f1f041a48ea90d4c1e6549a914f570f4b5a4262004a5472ee161e15f196f8705718cfe97f4076b7ea89031788983c9f0b9a49fd4e4cc584e38b3

    • C:\Users\Admin\AppData\Local\Temp\ÐÞ¸ÄÓÃ.txt

      Filesize

      3B

      MD5

      6e2713a6efee97bacb63e52c54f0ada0

      SHA1

      859371c78674de37bb9ae20743117bad002716e1

      SHA256

      5fbc314fb0b511345465b5b907ec6961328e5e393ff831c8d74912184098bf41

      SHA512

      71095ca02f2cd854850294a5525798175361c75695cf41148804e687b6db1a66a7b3a658c37ef32491721cc80e1caa07f4c20e3e05be29b529d1f22c1b8c419b

    • memory/1396-133-0x0000000000400000-0x0000000001A5A000-memory.dmp

      Filesize

      22.4MB

    • memory/1396-134-0x0000000006FC0000-0x000000000715F000-memory.dmp

      Filesize

      1.6MB

    • memory/1396-141-0x0000000000400000-0x0000000001A5A000-memory.dmp

      Filesize

      22.4MB

    • memory/1396-142-0x0000000006FC0000-0x000000000715F000-memory.dmp

      Filesize

      1.6MB