Analysis

  • max time kernel
    102s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 14:54

General

  • Target

    026fbdf71b14102cb9364e06a06e2b93.exe

  • Size

    287KB

  • MD5

    026fbdf71b14102cb9364e06a06e2b93

  • SHA1

    a210a51350fa517d53c5d58f3bb07ff19584a077

  • SHA256

    20b66a02786b24d202f7805c74786df8b3ade98ad12543cf30bb5728f4227946

  • SHA512

    2f23f5f6fd009b362072bff3a5e5a91ef56a3cd31da96aaa7533be1b70a84f6d521de2deaa7dc24bcf507f40ab6fac2d40b16f6c19e1effd96332b89f376c036

  • SSDEEP

    6144:lvIloK0zat8GzwzkIn68N2oK0zat8GzwzkIXfYnPYQNa:lQqK0qjIn5K0qjIQnAma

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\026fbdf71b14102cb9364e06a06e2b93.exe
    "C:\Users\Admin\AppData\Local\Temp\026fbdf71b14102cb9364e06a06e2b93.exe"
    1⤵
    • Drops file in Drivers directory
    • Sets service image path in registry
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c rmdir /S /Q "C:\Users\Admin\Cookies\"
      2⤵
        PID:4796
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c rmdir /S /Q "C:\Users\Admin\Application Data\Macromedia\Flash Player\"
        2⤵
          PID:2784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\drivers\spools.exe

        Filesize

        84KB

        MD5

        59c5eeb059ec67631ba1f051592b2083

        SHA1

        be7f57a3b0dac0a1c12acfde3fbaf6ce3a8e5810

        SHA256

        a11003948477fa1fd37f92b44cf56a6d9dcff24dc038853cb45f7c891299de49

        SHA512

        fa8b8507208306c75acd4b3f2236b0875a5b518d0c8e82ed627f320b53f473f767843caa812c077fee565dbee19832213a5f3975baa1fc5df98bbde27ddcaa9b

      • memory/3908-0-0x0000000000400000-0x0000000001564000-memory.dmp

        Filesize

        17.4MB

      • memory/3908-6-0x0000000000400000-0x0000000001564000-memory.dmp

        Filesize

        17.4MB