Analysis

  • max time kernel
    157s
  • max time network
    86s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/11/2023, 10:02

General

  • Target

    b842e45d493b0ed6abc0cc76467ebb9d1440389334054e98ebf327e2a349221f.exe

  • Size

    2.5MB

  • MD5

    5f5a15189f9eca3843ae765a41106e3f

  • SHA1

    4964d07c75c5e797b16074f33e8b710dda410fe0

  • SHA256

    b842e45d493b0ed6abc0cc76467ebb9d1440389334054e98ebf327e2a349221f

  • SHA512

    df3e1d3d1fd26cb012d9dc2672551e491b62b05b0b64143d1ec72c0d5c6cb9fa20c1f853454f2490e0df0ca189c3c8ba6a14bb84bfa6aa1be9f09058cd6f25ee

  • SSDEEP

    49152:CD2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hs1:CRzX71oDCRAZUviAHImDqia7hs1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b842e45d493b0ed6abc0cc76467ebb9d1440389334054e98ebf327e2a349221f.exe
    "C:\Users\Admin\AppData\Local\Temp\b842e45d493b0ed6abc0cc76467ebb9d1440389334054e98ebf327e2a349221f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\Broom.exe
      C:\Users\Admin\AppData\Local\Temp\Broom.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Broom.exe

    Filesize

    5.3MB

    MD5

    00e93456aa5bcf9f60f84b0c0760a212

    SHA1

    6096890893116e75bd46fea0b8c3921ceb33f57d

    SHA256

    ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

    SHA512

    abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

  • memory/4104-3-0x0000000000F50000-0x0000000000F51000-memory.dmp

    Filesize

    4KB

  • memory/4104-4-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB

  • memory/4104-6-0x0000000000F50000-0x0000000000F51000-memory.dmp

    Filesize

    4KB

  • memory/4104-9-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB

  • memory/4104-10-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB