Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 22:16

General

  • Target

    3f79a494bf65e4627d087242e3a59f82.exe

  • Size

    673KB

  • MD5

    3f79a494bf65e4627d087242e3a59f82

  • SHA1

    9635e071f8271f28591d19961ff8e386f5397eb9

  • SHA256

    5f8386775e403adaa5f52e9e36003269a1d4e8cbf11bb2a4fc396728ac74a526

  • SHA512

    8db4e4b486d90493db7c0942a3ccb3592f7cd56ae8fd0b78791b2a1c5963eeedf29fc458f3de13d4f7e0dbb0527751225f27569df02f97519c9d4a4a15e8a4c9

  • SSDEEP

    12288:hDAtd5nBPtggVJOgIaQRs9sH36pmMI5FOcIfccGIFU49Z1swi1yUdPn7gJ2PUZ4:O/B/JZ/z9sX6gMEk33JRX1hib97gOX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe
    "C:\Users\Admin\AppData\Local\Temp\3f79a494bf65e4627d087242e3a59f82.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\sxe47AA.tmp
      "C:\Users\Admin\AppData\Local\Temp\sxe47AA.tmp"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sxe4798.tmp

    Filesize

    15KB

    MD5

    bd815b61f9948f93aface4033fbb4423

    SHA1

    b5391484009b39053fc8b1bba63d444969bafcfa

    SHA256

    b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76

    SHA512

    a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71

  • C:\Users\Admin\AppData\Local\Temp\sxe47AA.tmp

    Filesize

    1.0MB

    MD5

    387e2eb68052006c10e971bef5cb6a98

    SHA1

    e85eab33895e12fcbc89fd6307652f3f33db4369

    SHA256

    0e5e06a77430438d9f21a68303e26c676ff58211124963ba7b5acfea8db9445a

    SHA512

    fbc3f2be09db4c0946f60c61c7e3747eb499bfa08ea16e3a1265e3760f95335d5870c56a198a71eb798aca06106a8880f47e51ffcf57d7308295825fe82681fc

  • C:\Users\Admin\AppData\Local\Temp\sxe47AA.tmp

    Filesize

    1024KB

    MD5

    dc7a2d64ef36bf8dca4fc49b4295a656

    SHA1

    e8215e8e131f43e7ebcf61fcdaa0f8939708c36c

    SHA256

    9367362a6791f2676c334cd7a4101c097bf96f96714edfdbf95ece4e95854303

    SHA512

    354e8930308832843f2915a2750c5e6db199a4b8ec1ff6ab8086bb3cd95f65ad1dd0e7b488c9f80b71905446f4413cb4829441076f54cf196404ecc3e6645bba

  • memory/1576-14-0x00000000025A0000-0x00000000025A1000-memory.dmp

    Filesize

    4KB

  • memory/1576-16-0x0000000000400000-0x0000000000802000-memory.dmp

    Filesize

    4.0MB

  • memory/1576-18-0x00000000025A0000-0x00000000025A1000-memory.dmp

    Filesize

    4KB

  • memory/1576-19-0x0000000000400000-0x0000000000802000-memory.dmp

    Filesize

    4.0MB