Analysis

  • max time kernel
    131s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/12/2023, 14:11 UTC

General

  • Target

    3f41eeab7ce2e649cc2daf91d56d32a0.exe

  • Size

    15KB

  • MD5

    3f41eeab7ce2e649cc2daf91d56d32a0

  • SHA1

    590ae145dfc7c7edd3f9838125edc0465c11f5cd

  • SHA256

    c2274f5295ba76fdda51f479c9713a0c7985f21db4dfcc36cb84f7b4f94f5310

  • SHA512

    9b051f6c1fbef11b4fd30ef2eb38290af4c11dff362cb3b758aa6814f1804789d44d6332bc20109897527131d1bf020a748908ba062f189982632c9d7f38dd78

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY8QC:hDXWipuE+K3/SSHgxm8l

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f41eeab7ce2e649cc2daf91d56d32a0.exe
    "C:\Users\Admin\AppData\Local\Temp\3f41eeab7ce2e649cc2daf91d56d32a0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\DEM58C.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM58C.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Users\Admin\AppData\Local\Temp\DEM5A9E.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM5A9E.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Users\Admin\AppData\Local\Temp\DEMAF91.exe
          "C:\Users\Admin\AppData\Local\Temp\DEMAF91.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1364
          • C:\Users\Admin\AppData\Local\Temp\DEM4D1.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM4D1.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1940
            • C:\Users\Admin\AppData\Local\Temp\DEM59D3.exe
              "C:\Users\Admin\AppData\Local\Temp\DEM59D3.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1560
              • C:\Users\Admin\AppData\Local\Temp\DEMAFDF.exe
                "C:\Users\Admin\AppData\Local\Temp\DEMAFDF.exe"
                7⤵
                • Executes dropped EXE
                PID:2872

Network

    No results found
  • 10.180.0.115:1337
    3f41eeab7ce2e649cc2daf91d56d32a0.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM58C.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM5A9E.exe
    152 B
    3
  • 10.180.0.115:1337
    DEMAF91.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM4D1.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM59D3.exe
    152 B
    3
  • 10.180.0.115:1337
    DEMAFDF.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM58C.exe

    Filesize

    15KB

    MD5

    0454244aa977630d01be36e038e3150e

    SHA1

    1dec25deef966357a172410723750221dbcd0f1a

    SHA256

    d29a2efc1599a830d22a004972e73a4782e9fc5d7c6dccc2a2b371ca01143fc9

    SHA512

    13bfdb7293b8115afdde9de20868265cbda9f32d1fa9110b37f4eea3171f030e223bb68f52b61e6f3659cd2ba57f637131faae53267a959c46e7e1a752415ac7

  • C:\Users\Admin\AppData\Local\Temp\DEM5A9E.exe

    Filesize

    15KB

    MD5

    23f2eab2704a6f44fbf59c366ff5b782

    SHA1

    4db460abaa85cbeed40d81ad78485bd72b13ca3c

    SHA256

    721d34528e4556fa5c215e4c8dbaf6495bb6cfe0cc28ee945db7180d3960b885

    SHA512

    b09efa9351c1c9c94281a73a5e91517e6003655eeaf5af5be71c05b757ff133beda47f4cb2c85810b1da2af5db2e8b727c24fea94e873c06fd18dd08019470bc

  • \Users\Admin\AppData\Local\Temp\DEM4D1.exe

    Filesize

    15KB

    MD5

    cf5e99a11c7dabcfe11c17e3368868c1

    SHA1

    d363b35718585c3d8131ef4e82be71b07fc2333c

    SHA256

    f430c31519f662b2d06b40c123212030c64bc13e4f5bfa9ec23af94135dd1147

    SHA512

    bc798376bb52c25a8c8a645d401303c4ac02771fa0c1f5b0d4bd48d7a49eb83ef6e62bd70d97e65d4b4ff302831bf41da49ebe592f01069922a5cdd6c1b683a9

  • \Users\Admin\AppData\Local\Temp\DEM59D3.exe

    Filesize

    15KB

    MD5

    0ec5242aab4adbd3b07a14c733784151

    SHA1

    cc5e3734310095fa8eb8590004ea3d7f79917f2a

    SHA256

    4e389604fd264e83b1611c15a08a4d288639a748a8c85ead618e15365ba18aeb

    SHA512

    a7cfb5e5c9cee48d2266a6ed26a3a14f880b6411a3df9099e431167889fcdc9caf46619bf4daaff4dd3141da77e6aef508fa9143a87f657f616dcb3b8734f765

  • \Users\Admin\AppData\Local\Temp\DEMAF91.exe

    Filesize

    15KB

    MD5

    a3192f81d92371405ec89430d6f66bd1

    SHA1

    4d85723689b0cf118a1fdf8d8496c09c94fa0a4a

    SHA256

    530a022a41b9fb7b34d6f391c661eb90ff8d148810b19a7e424cab56fe7a1964

    SHA512

    1b64013380fea98e2d115855b13ec6b8a0b76bad4b65549225182771a30b57def990304a740e4391241095dd15691013a357c509bf9e63f1432797958bd543fa

  • \Users\Admin\AppData\Local\Temp\DEMAFDF.exe

    Filesize

    15KB

    MD5

    2c15d8c391528848e2321788ff41cd8c

    SHA1

    2b0584ad16a1733e79b2dbff4367b6e0af28fd32

    SHA256

    c30a15f06d162b0434626f22e4861e05ebdc225de4d5de778c5ac9577da06b99

    SHA512

    41d5c7b6435ec70ce43d40f10e710a8e5424e8fb8ab4de9ec74bda7384311819331a053d502770dbc81f0eb72f4376a1c4186981af42eac8574d8992ea279969

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.