Analysis

  • max time kernel
    410s
  • max time network
    1140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    25/11/2023, 14:05

General

  • Target

    TmUnitedForever_Update_2010-03-15_Setup.exe

  • Size

    21.4MB

  • MD5

    389b1a7e5ca1e9ef9860393d3df74ef0

  • SHA1

    1bd85f6a8a83390108ecb947bff0bfb3932028b2

  • SHA256

    f410ba92219f993ab224a4a672d0637649e2d5d36d003c9f1ce7f84f889fc9c5

  • SHA512

    746a8eb6ff7663a3da1d63888ce36860a051c64e3c8d21ea4f75007c37778269a3f003a13995c7ce3fc6af6a207353bc92e7b0621cf4a8470f9b799fddf53471

  • SSDEEP

    393216:Z2x7aCNkOhe8vOpTLkqNbsrXKD2QiGv8d/ZL9wOO4DitcMf7Z:0EOnRGp7bN2Q/0dbwOHimMt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TmUnitedForever_Update_2010-03-15_Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\TmUnitedForever_Update_2010-03-15_Setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\is-11B04.tmp\TmUnitedForever_Update_2010-03-15_Setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-11B04.tmp\TmUnitedForever_Update_2010-03-15_Setup.tmp" /SL5="$F008E,22070463,53248,C:\Users\Admin\AppData\Local\Temp\TmUnitedForever_Update_2010-03-15_Setup.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-11B04.tmp\TmUnitedForever_Update_2010-03-15_Setup.tmp

    Filesize

    669KB

    MD5

    52950ac9e2b481453082f096120e355a

    SHA1

    159c09db1abcee9114b4f792ffba255c78a6e6c3

    SHA256

    25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

    SHA512

    5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

  • C:\Users\Admin\AppData\Local\Temp\is-11B04.tmp\TmUnitedForever_Update_2010-03-15_Setup.tmp

    Filesize

    669KB

    MD5

    52950ac9e2b481453082f096120e355a

    SHA1

    159c09db1abcee9114b4f792ffba255c78a6e6c3

    SHA256

    25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

    SHA512

    5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

  • memory/3656-1-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3656-13-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3656-21-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3828-7-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/3828-14-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/3828-16-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB

  • memory/3828-20-0x0000000000400000-0x00000000004B6000-memory.dmp

    Filesize

    728KB