Analysis

  • max time kernel
    39s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2023 19:35

General

  • Target

    en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe

  • Size

    95.1MB

  • MD5

    929c7d22f846f80f837e7fa14868c8f3

  • SHA1

    0df49904e08c4fcd537c91c3709db74b15de2ca8

  • SHA256

    cd908e832019fb106464e56bba335775e226869e79651c05ef2728dbd9774e75

  • SHA512

    644ac8ba51eda8503d0a0d580e1c012c7272f7698213446b544fda9cfe602b304fdb551623d1802ec403ad3070b9e32a6dd9e31ced04b10ceba652aaed737619

  • SSDEEP

    1572864:nu3tJGgWTcaZRoPvh9yrmGBGGHl9s2btsHv0BW76tNUa1+AmW9tGyrWP95Ie:gY1Qas9KNBll9s2btIv1OXoyinIe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe
    "C:\Users\Admin\AppData\Local\Temp\en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\smv.exe
      "C:\Users\Admin\AppData\Local\Temp\smv.exe" x en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.svf -br .
      2⤵
      • Executes dropped EXE
      PID:1912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\en_windows_10_enterprise_ltsc_2019_x64_dvd_74865958.svf

    Filesize

    93.9MB

    MD5

    2dddf957abb459abf4add950636d9547

    SHA1

    e5b1732cb6dc3d930f8a7bcfee2ed127106f8d68

    SHA256

    a73e69477c25b3ea28bb831cc7be08bb2d829f0bcaef865704547781ce7d15c6

    SHA512

    925c2c43fcf87e97d292e288d9204ae3c60388578b9dd34c55ea3f892eea1b17aa9aa52c3208478b5da554d65860a8e1fa20fc6c75f1df87f4296f7c0890bc22

  • C:\Users\Admin\AppData\Local\Temp\smv.exe

    Filesize

    774KB

    MD5

    9d427ca64b3971a919d1ea7fb95c3cd1

    SHA1

    ae63bceb5609e41e918c62369c07d5e0b4c53280

    SHA256

    90eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4

    SHA512

    58f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a

  • C:\Users\Admin\AppData\Local\Temp\smv.exe

    Filesize

    774KB

    MD5

    9d427ca64b3971a919d1ea7fb95c3cd1

    SHA1

    ae63bceb5609e41e918c62369c07d5e0b4c53280

    SHA256

    90eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4

    SHA512

    58f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a

  • \Users\Admin\AppData\Local\Temp\smv.exe

    Filesize

    774KB

    MD5

    9d427ca64b3971a919d1ea7fb95c3cd1

    SHA1

    ae63bceb5609e41e918c62369c07d5e0b4c53280

    SHA256

    90eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4

    SHA512

    58f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a

  • \Users\Admin\AppData\Local\Temp\smv.exe

    Filesize

    774KB

    MD5

    9d427ca64b3971a919d1ea7fb95c3cd1

    SHA1

    ae63bceb5609e41e918c62369c07d5e0b4c53280

    SHA256

    90eb6b0198e4ba01783ee8f5f41dae2b25df8c7cc78c841625ccae7ffe43a5d4

    SHA512

    58f13103ae5d9f1977044814c2ffe331283f9049535a73acb76ed39cd94934b95a1425cf8d36986299e6102fae244fa6ac7aa989b231d8692e9fc6ca5999fb8a