Analysis

  • max time kernel
    70s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2023 17:09

General

  • Target

    83readytorelease/ida.exe

  • Size

    4.0MB

  • MD5

    05c7e465d9d88e94e064a99dc36f4ce1

  • SHA1

    e87ccd7bcfa05a30aa283c5e5953ba368ff75bed

  • SHA256

    d2650a12440bdc4f1b34456956221764c249060e808194b79152e9f679dd4e85

  • SHA512

    a9af650ea3518f88c5f8d9e1d059fd039c88d70b733ccec4107f75b14b6d9489a79dffa3ff5fbd7343ebeeb0ae90d26cdac64b79da006b5cb0c25316a66aacc4

  • SSDEEP

    49152:5MPnm/Zi34DKYj0ZkO4+XTcSq8EQtezdGfPko7FjOeBfDMmpwfFcnQOh6H6RBvV9:5smOqjcXA0nexReBv6avGBXMi+7Wg

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83readytorelease\ida.exe
    "C:\Users\Admin\AppData\Local\Temp\83readytorelease\ida.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3360
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3f4 0x240
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\EnterUse.exe.id0

    Filesize

    16KB

    MD5

    c4d1ccd6d1ed0276b6b3529441acc387

    SHA1

    3f8f1ec2600be3c051f8fdb0502b936bfaa945fd

    SHA256

    49a4367f6db737ceecd36e3a2721dba22bbd806d39720d92e44c2413af80b3f1

    SHA512

    b1372c47fafcb583bcfe178ff0b9cf66b774e0164975d1bfdbad243e1edfb704cfd1c7372adef21979561683450adb6d37ad60aa925d0a4a8f6168addb81fc95

  • memory/3360-1-0x00007FF9BF620000-0x00007FF9BFB78000-memory.dmp

    Filesize

    5.3MB

  • memory/3360-0-0x00007FF7985C0000-0x00007FF7989C0000-memory.dmp

    Filesize

    4.0MB

  • memory/3360-2-0x000002278B030000-0x000002278B040000-memory.dmp

    Filesize

    64KB

  • memory/3360-3-0x000002278B030000-0x000002278B040000-memory.dmp

    Filesize

    64KB