Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2023, 23:51

General

  • Target

    fb44d218d244ced132cc81e1fe1543b61ca0d7f04144fff4912ef52c0955baa8.exe

  • Size

    944KB

  • MD5

    63bef0e3298f44203bce4fb0bd015f1f

  • SHA1

    6aa9170bce8ea7ec6aed8099d40177fc187711f6

  • SHA256

    fb44d218d244ced132cc81e1fe1543b61ca0d7f04144fff4912ef52c0955baa8

  • SHA512

    6d594ebd01a85d0c1a2b1ea42c789ffda4b709f43687f62010d02b1897476b4af9baadd879a789737b4a7be0b494f095d08375ba3d5baa25dac3be8839d384e1

  • SSDEEP

    12288:j0ry/qeS6RuiK/Ihz4U7q0ZH4kln+v4I7C8gZ97HVrUbc61t5ReBIRA:j0ryieF2/IZ4UWin+QHR+B1/QBj

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb44d218d244ced132cc81e1fe1543b61ca0d7f04144fff4912ef52c0955baa8.exe
    "C:\Users\Admin\AppData\Local\Temp\fb44d218d244ced132cc81e1fe1543b61ca0d7f04144fff4912ef52c0955baa8.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Users\Admin\AppData\Local\Temp\oPeEXlvEnw.exe
      "C:\Users\Admin\AppData\Local\Temp\oPeEXlvEnw.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3660

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\oPeEXlvEnw.exe

          Filesize

          2.1MB

          MD5

          26d3e31b5ab7309b39af322163b914ec

          SHA1

          4a1d53a6e0cd4149c4282b6f82454b1ad3563bb5

          SHA256

          e639f70248ba046b694c0214e1d85994bc0e8f50695a9fc6af8f8af449c13475

          SHA512

          2b93b24fd961ddf5be5b64f02077c4a68063155e031e8bb333d2b6f909aa9c3ca9d01487558beaab14c4613b496614cf0a064f6e12e2c0d4b505549f4e472f10

        • C:\Users\Admin\AppData\Local\Temp\oPeEXlvEnw.exe

          Filesize

          2.1MB

          MD5

          26d3e31b5ab7309b39af322163b914ec

          SHA1

          4a1d53a6e0cd4149c4282b6f82454b1ad3563bb5

          SHA256

          e639f70248ba046b694c0214e1d85994bc0e8f50695a9fc6af8f8af449c13475

          SHA512

          2b93b24fd961ddf5be5b64f02077c4a68063155e031e8bb333d2b6f909aa9c3ca9d01487558beaab14c4613b496614cf0a064f6e12e2c0d4b505549f4e472f10

        • C:\Users\Admin\AppData\Local\Temp\oPeEXlvEnw.exe

          Filesize

          2.1MB

          MD5

          26d3e31b5ab7309b39af322163b914ec

          SHA1

          4a1d53a6e0cd4149c4282b6f82454b1ad3563bb5

          SHA256

          e639f70248ba046b694c0214e1d85994bc0e8f50695a9fc6af8f8af449c13475

          SHA512

          2b93b24fd961ddf5be5b64f02077c4a68063155e031e8bb333d2b6f909aa9c3ca9d01487558beaab14c4613b496614cf0a064f6e12e2c0d4b505549f4e472f10

        • memory/3660-72-0x0000000000400000-0x0000000000659000-memory.dmp

          Filesize

          2.3MB

        • memory/3660-74-0x0000000000400000-0x0000000000659000-memory.dmp

          Filesize

          2.3MB

        • memory/4976-0-0x0000000000400000-0x000000000052D000-memory.dmp

          Filesize

          1.2MB

        • memory/4976-73-0x0000000000400000-0x000000000052D000-memory.dmp

          Filesize

          1.2MB