Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-11-2023 16:14

General

  • Target

    5cd9259a1d532e2a2e17e76a15cddf6e454b521809eb57bf7a728f340ef0610a.exe

  • Size

    4.0MB

  • MD5

    d01f7a994737144e0a1eca5883c21f23

  • SHA1

    33797bea71f57da682d27f3a4e20ab7c49358aa8

  • SHA256

    5cd9259a1d532e2a2e17e76a15cddf6e454b521809eb57bf7a728f340ef0610a

  • SHA512

    0b42b5abe366f92b92e27cd28600d8e1346c870bf681173cb73818d138bb5f39d94ffb59118051fa653dd307893534bfaf8247e583bb704ec0ea79e6040baf2b

  • SSDEEP

    98304:wdZzTT+hPu8wDHcM7MQv7rz0stjXDWZuWZFTVxndTsxwXq7e:wZzTyhPuJ7MQv7rAsJXSZJPVxnfXq7e

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Unexpected DNS network traffic destination 5 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 28 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cd9259a1d532e2a2e17e76a15cddf6e454b521809eb57bf7a728f340ef0610a.exe
    "C:\Users\Admin\AppData\Local\Temp\5cd9259a1d532e2a2e17e76a15cddf6e454b521809eb57bf7a728f340ef0610a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Users\Admin\AppData\Local\Temp\is-ASQOJ.tmp\is-FUJA4.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ASQOJ.tmp\is-FUJA4.tmp" /SL4 $701FC "C:\Users\Admin\AppData\Local\Temp\5cd9259a1d532e2a2e17e76a15cddf6e454b521809eb57bf7a728f340ef0610a.exe" 3944057 270848
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /Query
        3⤵
          PID:3508
        • C:\Program Files (x86)\PhotoSnap\PhotoSnap.exe
          "C:\Program Files (x86)\PhotoSnap\PhotoSnap.exe" -i
          3⤵
          • Executes dropped EXE
          PID:4556
        • C:\Program Files (x86)\PhotoSnap\PhotoSnap.exe
          "C:\Program Files (x86)\PhotoSnap\PhotoSnap.exe" -s
          3⤵
          • Executes dropped EXE
          PID:916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\PhotoSnap\PhotoSnap.exe

      Filesize

      2.1MB

      MD5

      becfdb9f166dd14d61eb3a0951cb5077

      SHA1

      73d8718f7cfd668059fa0ca6ad9176bcefafafaf

      SHA256

      72b9ef6801b50284c6a3b9f1c6dae427da7681a32193084b6b9060afa87fd75a

      SHA512

      bcdfc7179c887b9bbb759fa83e883853fa89939b40fa4f54170a6b35be00f4ad1cd56534f9179c6682dc88e1a6a131e8bd01828292b1664df6f5bdb6cb0d2554

    • C:\Program Files (x86)\PhotoSnap\PhotoSnap.exe

      Filesize

      2.1MB

      MD5

      becfdb9f166dd14d61eb3a0951cb5077

      SHA1

      73d8718f7cfd668059fa0ca6ad9176bcefafafaf

      SHA256

      72b9ef6801b50284c6a3b9f1c6dae427da7681a32193084b6b9060afa87fd75a

      SHA512

      bcdfc7179c887b9bbb759fa83e883853fa89939b40fa4f54170a6b35be00f4ad1cd56534f9179c6682dc88e1a6a131e8bd01828292b1664df6f5bdb6cb0d2554

    • C:\Program Files (x86)\PhotoSnap\PhotoSnap.exe

      Filesize

      2.1MB

      MD5

      becfdb9f166dd14d61eb3a0951cb5077

      SHA1

      73d8718f7cfd668059fa0ca6ad9176bcefafafaf

      SHA256

      72b9ef6801b50284c6a3b9f1c6dae427da7681a32193084b6b9060afa87fd75a

      SHA512

      bcdfc7179c887b9bbb759fa83e883853fa89939b40fa4f54170a6b35be00f4ad1cd56534f9179c6682dc88e1a6a131e8bd01828292b1664df6f5bdb6cb0d2554

    • C:\Users\Admin\AppData\Local\Temp\is-ASQOJ.tmp\is-FUJA4.tmp

      Filesize

      643KB

      MD5

      a991510c12f20ccf8a5231a32a7958c3

      SHA1

      122724d1a4fdea39af3aa427e4941158d7e91dfa

      SHA256

      0c3ab280e156e9ff6a325267bc5d721f71dcb12490a53a03a033d932272f9198

      SHA512

      8f387a6189f6fa51f84004706589ed1706dfd08dfc38c1f8ce3ce010f37efac085fd241396ab69bc25c86174a4637492163bf3cb26f88639551dc9fa0c52eafa

    • C:\Users\Admin\AppData\Local\Temp\is-ASQOJ.tmp\is-FUJA4.tmp

      Filesize

      643KB

      MD5

      a991510c12f20ccf8a5231a32a7958c3

      SHA1

      122724d1a4fdea39af3aa427e4941158d7e91dfa

      SHA256

      0c3ab280e156e9ff6a325267bc5d721f71dcb12490a53a03a033d932272f9198

      SHA512

      8f387a6189f6fa51f84004706589ed1706dfd08dfc38c1f8ce3ce010f37efac085fd241396ab69bc25c86174a4637492163bf3cb26f88639551dc9fa0c52eafa

    • \Users\Admin\AppData\Local\Temp\is-M07BD.tmp\_iscrypt.dll

      Filesize

      2KB

      MD5

      a69559718ab506675e907fe49deb71e9

      SHA1

      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

      SHA256

      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

      SHA512

      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

    • memory/916-103-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-106-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-125-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-122-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-119-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-77-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-116-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-113-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-80-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-110-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-84-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-85-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-88-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-91-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-94-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-97-0x00000000008A0000-0x000000000094A000-memory.dmp

      Filesize

      680KB

    • memory/916-98-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/916-99-0x00000000008A0000-0x000000000094A000-memory.dmp

      Filesize

      680KB

    • memory/916-107-0x00000000008A0000-0x000000000094A000-memory.dmp

      Filesize

      680KB

    • memory/2488-81-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/2488-79-0x0000000000400000-0x00000000004CF000-memory.dmp

      Filesize

      828KB

    • memory/2488-7-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/4412-1-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/4412-78-0x0000000000400000-0x0000000000448000-memory.dmp

      Filesize

      288KB

    • memory/4556-70-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/4556-74-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB

    • memory/4556-72-0x0000000000400000-0x000000000061D000-memory.dmp

      Filesize

      2.1MB