Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
420d75f5605d1970bb0ae2325f868ffc.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
420d75f5605d1970bb0ae2325f868ffc.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
420d75f5605d1970bb0ae2325f868ffc.exe
-
Size
142KB
-
MD5
420d75f5605d1970bb0ae2325f868ffc
-
SHA1
dd487cd7b5dbb72340606957d92864262323ab28
-
SHA256
415f63f9f37cdbed215679e6f4da83dabfe31f9ce6fb794adb6da3a5d26e6c94
-
SHA512
61b2c95190e3cd10fea9442cdba28b2d37e4d6a1391c69ea0ef2490882c5244e70d29cf620df72b543f3bc9dd38a9749657db19e6e215b53704fa0f27cea2509
-
SSDEEP
3072:hnOn7t7XpdpCCTg/sxFgJ6eqgKJ+BCZCfrJG7AKvKDc2qeJz2uT:hKpdcCrTdgKoTr1ueR2E
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3868 downloadmr.exe -
Loads dropped DLL 2 IoCs
pid Process 556 420d75f5605d1970bb0ae2325f868ffc.exe 556 420d75f5605d1970bb0ae2325f868ffc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3868 downloadmr.exe 3868 downloadmr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 556 wrote to memory of 3868 556 420d75f5605d1970bb0ae2325f868ffc.exe 20 PID 556 wrote to memory of 3868 556 420d75f5605d1970bb0ae2325f868ffc.exe 20 PID 556 wrote to memory of 3868 556 420d75f5605d1970bb0ae2325f868ffc.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\420d75f5605d1970bb0ae2325f868ffc.exe"C:\Users\Admin\AppData\Local\Temp\420d75f5605d1970bb0ae2325f868ffc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\nsk3904.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nsk3904.tmp\downloadmr.exe /u4d4881ec-1a64-40da-b78d-79555bc06ebe /e1068922⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3868
-