Analysis

  • max time kernel
    1s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 07:54

General

  • Target

    1051331377ce2c05fe7df572f776b3c2.exe

  • Size

    447KB

  • MD5

    1051331377ce2c05fe7df572f776b3c2

  • SHA1

    61b8072f3ff65e094dafd22772322dda2d423bbb

  • SHA256

    23b5eed5ea35c2a4e220bcccda53d3b74361084c2c001916b68e1c89edb4b5a3

  • SHA512

    56342e9b9a6001c7c768b93554104b70588a5004e15d6f90521ecd92dee3d749a5d32981e974471fe3da98eb626c0093ea35c9c3e75eac5bfddbe820453204a2

  • SSDEEP

    12288:7LxKg15iJA3sc3Xy9uTk4FF1g38Hx1iCJXOyC1aNJjrlIpGPyh:7LxK83N3i9uTk4rH1fiaNhRIpGPyh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1051331377ce2c05fe7df572f776b3c2.exe
    "C:\Users\Admin\AppData\Local\Temp\1051331377ce2c05fe7df572f776b3c2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\ef.exe
      C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\ef.exe "C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\inetc.dll" -111
      2⤵
      • Executes dropped EXE
      PID:2932
    • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\mf.exe
      C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\mf.exe "C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\inetc.dll"
      2⤵
      • Executes dropped EXE
      PID:4612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\ef.exe

    Filesize

    2KB

    MD5

    b8a00d99534bf83442b20b2474b767cf

    SHA1

    505d3f6591db0f87a73a0ac820cc2eba5171cfff

    SHA256

    cc6d58b72d806d7f314d31fbea1fd3b72708b2f9dd6d7203e12cf0e076337af6

    SHA512

    75df70621957af1bb2c072ca76cd6f9c5cd92d11e54691daa87d37c0c8bdad5979f8679b49e3e5fc5aa83081ef7b85e6b46393a0877520583d7cca43874ebbd5

  • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\inetc.dll.out

    Filesize

    19KB

    MD5

    e93d89074477fec8889ebac9d62b5c39

    SHA1

    efd9720cbfaad9422a7861df1de9a62ade2f01ab

    SHA256

    5d4a0d7b0ffc7c66ed1c82f9a1113171144ce8b4e13b1d32a63633b903681e7f

    SHA512

    e6b208739e9a3c555b7a652a05950e375732352ace80454b50d6f9fd7d39942827ef4c86ed8e707361b299d7a0eaccf368be50eb337739da956537242072f488

  • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\inetc.dll.out0

    Filesize

    9KB

    MD5

    9e58ede648d8d1440df0837ed5876e4d

    SHA1

    0752f706596d3fc29efab8b08ebe68dd45ad8d76

    SHA256

    9587850fc6e0cfee023d884e69418219f00726d6d4b029f7d1172d85ec3bae0a

    SHA512

    35222bf5fa64828dfccd4676d6d17c2e3e9f8707e9d2edfb1dde2bb0ac5e0d8cd0f13c4fc5130a8701c1456c1fd0efad2bc5f139f80961f897d585eb1de5ec83

  • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\inetc.dll.out1

    Filesize

    9KB

    MD5

    189f6fe10648792200f5ba64343274a7

    SHA1

    5bb1c9d0b4eee3c64daff88707773f78b60be527

    SHA256

    3f13b20ce35f5893a03f2a823ad4287e52932dedd0a7a23c6f57384f43d583d9

    SHA512

    dda2f0a9376018c3a64340a1996395d4b86ef519cfc60a1a1f641376119662f969ede0155d47c78789a69520842a888eec0ba67fc94fe3e62e2fc8a914f15088

  • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\mf.exe

    Filesize

    2KB

    MD5

    224df7127c7ee69e67380eefc983a6ff

    SHA1

    236c342c5bd1f71725534d097fcd8538dd95aa56

    SHA256

    9ca35b84699aff2125cbe775c0731e69dad1d667d3ceec6db59c954dd9c83965

    SHA512

    c238c9fb0285eadd63e9f819b4aead95d88f312ef2a11749a879ba105a0c590e23e2def83f9cd8860744b9307bf12c71fbffbb482fa143e3b13b7934c23df80f

  • C:\Users\Admin\AppData\Local\Temp\nse44F9.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe

  • memory/2476-49-0x0000000003D10000-0x0000000003D2A000-memory.dmp

    Filesize

    104KB

  • memory/2476-41-0x0000000003D00000-0x0000000003D0C000-memory.dmp

    Filesize

    48KB