Overview
overview
7Static
static
3Top Passwo...ry.exe
windows7-x64
1Top Passwo...ry.exe
windows10-2004-x64
1Top Passwo...lp.chm
windows7-x64
1Top Passwo...lp.chm
windows10-2004-x64
1Top Passwo...91.dll
windows7-x64
3Top Passwo...91.dll
windows10-2004-x64
3Top Passwo...20.dll
windows7-x64
3Top Passwo...20.dll
windows10-2004-x64
3Top Passwo...00.exe
windows7-x64
7Top Passwo...00.exe
windows10-2004-x64
7Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231201-en -
resource tags
arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
Top Password/ZIP Password Recovery.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Top Password/ZIP Password Recovery.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral3
Sample
Top Password/ZPRHelp.chm
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Top Password/ZPRHelp.chm
Resource
win10v2004-20231127-en
Behavioral task
behavioral5
Sample
Top Password/cudart32_91.dll
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Top Password/cudart32_91.dll
Resource
win10v2004-20231127-en
Behavioral task
behavioral7
Sample
Top Password/msvcr120.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Top Password/msvcr120.dll
Resource
win10v2004-20231130-en
Behavioral task
behavioral9
Sample
Top Password/unins000.exe
Resource
win7-20231201-en
Behavioral task
behavioral10
Sample
Top Password/unins000.exe
Resource
win10v2004-20231201-en
General
-
Target
Top Password/unins000.exe
-
Size
1.2MB
-
MD5
dd67786f854894db433ea687fd687f3b
-
SHA1
fae38fe891303a6fd38de6e19740baeb92c388d1
-
SHA256
0e3a895a64fd35a4786beaea130cdf6b3b5534a466622de6fe9fe4edf66ed98a
-
SHA512
a6fbbe3712619d7417dea78dfa38c78857c9f63b49252a235038fb6d2adf277b5fda5b1f487c67b7e151261064ca8ca0b7c6b8f17549ab93009e8cb915772adf
-
SSDEEP
24576:2nbbPImgK4brDi4IxgRqzwqNb+Yz73P2EMZbG0JEt0qx9R8:8HeKh4nqzF3PYdStp0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4244 _iu14D2N.tmp -
Executes dropped EXE 1 IoCs
pid Process 4244 _iu14D2N.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4244 _iu14D2N.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4244 4356 unins000.exe 89 PID 4356 wrote to memory of 4244 4356 unins000.exe 89 PID 4356 wrote to memory of 4244 4356 unins000.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Top Password\unins000.exe"C:\Users\Admin\AppData\Local\Temp\Top Password\unins000.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp"C:\Users\Admin\AppData\Local\Temp\_iu14D2N.tmp" /SECONDPHASE="C:\Users\Admin\AppData\Local\Temp\Top Password\unins000.exe" /FIRSTPHASEWND=$D00442⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD558e86c71b7aed34259f8a657b344d294
SHA1d91a313d1c0d8cd42f32583aed4f480994bb9b4d
SHA2563833f2cdec0ab24703fc81e34c52fa1c572d092e6b665fa623a2ecbb4a7424a1
SHA5126cf7b4f92d34ed7c14a76e9bd9363f2670e05c026df029d95d55346e5247fa4cbd38417f87bee15b41bbf88d40a1ed55c71f49a03105136d2bc24e5a6f5216de
-
Filesize
14KB
MD5605ac30193878e848f9c4432f2cfe455
SHA1eb999e89ca47fdc75553afd714e94dcb309044e1
SHA256785b9c0e492d1981860ac6d82662924303b7fc3b3188d448e4d0e7a46f0ef150
SHA51282a24141c2ad5321be1ab035466675bac0dcad3e652775f2ed2ec27b19f537f7b21f0626fc475b5310ef7b73269ff8524c4a7139f61adbb4f1e36130b4b672f9