Analysis

  • max time kernel
    143s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20231025-en
  • resource tags

    arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-11-2023 18:44

General

  • Target

    98632ead712a78658e1cb313c67be0f9edc0effcc974d275b565b4a2dcec337a.exe

  • Size

    2.5MB

  • MD5

    0acaed53e06b778dbb921c932fac2920

  • SHA1

    5131c9c0965f08ffcd0f8b13024ee506c695f729

  • SHA256

    98632ead712a78658e1cb313c67be0f9edc0effcc974d275b565b4a2dcec337a

  • SHA512

    70cec96a85d80aee3487cfeed4844f6e8fda0ede9fb7311fd7c20b762d26e2589d78638535ce6e88320f72b23d93705c209a4e1df9677a2f07a27fd1226d19d0

  • SSDEEP

    49152:CI2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hsm:C4zX71oDCRAZUviAHImDqia7hsm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98632ead712a78658e1cb313c67be0f9edc0effcc974d275b565b4a2dcec337a.exe
    "C:\Users\Admin\AppData\Local\Temp\98632ead712a78658e1cb313c67be0f9edc0effcc974d275b565b4a2dcec337a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Users\Admin\AppData\Local\Temp\Broom.exe
      C:\Users\Admin\AppData\Local\Temp\Broom.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Broom.exe

    Filesize

    5.3MB

    MD5

    00e93456aa5bcf9f60f84b0c0760a212

    SHA1

    6096890893116e75bd46fea0b8c3921ceb33f57d

    SHA256

    ff3025f9cf19323c5972d14f00f01296d6d7a71547eca7e4016bfd0e1f27b504

    SHA512

    abd2be819c7d93bd6097155cf84eaf803e3133a7e0ca71f9d9cbc3c65e4e4a26415d2523a36adafdd19b0751e25ea1a99b8d060cad61cdfd1f79adf9cd4b4eca

  • memory/1760-3-0x0000000001080000-0x0000000001081000-memory.dmp

    Filesize

    4KB

  • memory/1760-4-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB

  • memory/1760-6-0x0000000001080000-0x0000000001081000-memory.dmp

    Filesize

    4KB

  • memory/1760-7-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB

  • memory/1760-11-0x0000000000400000-0x0000000000965000-memory.dmp

    Filesize

    5.4MB