Analysis

  • max time kernel
    140s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 22:29

General

  • Target

    15cd6c90d555733c5680657b65dbbf6a.exe

  • Size

    877KB

  • MD5

    15cd6c90d555733c5680657b65dbbf6a

  • SHA1

    038c5f568f01e7abf2413eff150450e5a1201657

  • SHA256

    24ce5ba043b8672a7c319bfb6809d9ab9a80d954a06893cd758f865dd6b76af4

  • SHA512

    772f1a34f5a497453c561571597fc348e1093589e2398c12d5e445b184eb3e9baa7ac52513cb186c2638bd8da0ee10bd73127c3aca8906f122f37382a5a0ad0c

  • SSDEEP

    24576:J6MLKmtvPyHu7StweGy9pNg4W7HMfG3bOAHC8G:UiKmHyOWtT4p7sIw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe
    "C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4636
    • C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe
      "C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe
        "C:\Users\Admin\AppData\Local\Temp\15cd6c90d555733c5680657b65dbbf6a.exe"
        3⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tBAiGwjHxsL7pSORmut\extramod.dll

    Filesize

    73KB

    MD5

    5dbff0f5700e6d294b86f3b66bbf7284

    SHA1

    e21c966a3559cd79eaa129f4ab55332f254cb6a4

    SHA256

    c2e795370bb488582976b3414d3240dcb6c60e561fbd72fddcc0d3e290137745

    SHA512

    0742ae42f70fd598a4dd0cfd7b4e18c51149d69d53fab72786a6354771812257b56d08bacc3445632dba5762a46ce04b923243fdbd5928b54b49e948762af82f

  • C:\Users\Admin\AppData\Local\Temp\tBAiGwjHxsL7pSORmut\loading_screen.dll

    Filesize

    5KB

    MD5

    44dac7f87bdf94d553f8d2cf073d605d

    SHA1

    21bf5d714b9fcab32ba40ff7d36e48c378b67a06

    SHA256

    0e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66

    SHA512

    92c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774

  • C:\Users\Admin\AppData\Local\Temp\tBAiGwjHxsL7pSORmut\lua51.dll

    Filesize

    494KB

    MD5

    f0c59526f8186eadaf2171b8fd2967c1

    SHA1

    8ffbe3e03d8139b50b41931c7b3360a0eebdb5cb

    SHA256

    6e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6

    SHA512

    dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854

  • C:\Users\Admin\AppData\Local\Temp\tBAiGwjHxsL7pSORmut\shared_library.dll

    Filesize

    200KB

    MD5

    4bed2ad051d6e8d5d555d3b3814f98a3

    SHA1

    c96eff10f10e86f528b1588ecd6c6463a76fb930

    SHA256

    4b5a6fa0e5feae61647fb364145403e3fe92c9dcd6a35b32830a4028cd265315

    SHA512

    ec0f25a199c5974e10f16c0d4c7388ed16ccb8c944a7eb9a9f426fb322fa319ce9ca50e995fdb40720f064f14572340003c7c7fbd25501d40cca4ecdcb3a4833

  • C:\Users\Admin\AppData\Local\Temp\tBAiGwjHxsL7pSORmut\shared_library.dll

    Filesize

    93KB

    MD5

    e90933456227fe97b19c348a018cf0b5

    SHA1

    23517af6384f9817a6978b357b06184e2b2b0a63

    SHA256

    0813de05b9721060fcc2d138c441f897f2d479d49020f4453e499ef26b13e29b

    SHA512

    8776523ceabdc3aa0563ec7be009159bea9cd2f464e8aeadb5962909585d4d4d2e3218b071e315f683dc8877ff58b17aaa7977645679beb39d796eb0ef662872

  • memory/4804-7-0x0000000000770000-0x0000000000786000-memory.dmp

    Filesize

    88KB

  • memory/4804-14-0x0000000002140000-0x0000000002176000-memory.dmp

    Filesize

    216KB

  • memory/4804-17-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/4804-18-0x000000007FE30000-0x000000007FE40000-memory.dmp

    Filesize

    64KB

  • memory/4804-24-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB