Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 18:58

General

  • Target

    0114025fec63d213c0f6666c1e26facb.exe

  • Size

    2.0MB

  • MD5

    0114025fec63d213c0f6666c1e26facb

  • SHA1

    f1621d16b52c137cbb30473f096601ac116f038b

  • SHA256

    e03519e14336288797ef6693a9ac42391baefda36a8b70496a5a257a13f32050

  • SHA512

    a16c7d37104b78f0774e8efef5188c55268c7c635b3de22a5f1bb07f3bfd8133ea35186d0e2e4a07b394f5fa93540606d9da70d152b0801cf997115aa41ea8a8

  • SSDEEP

    49152:I2uVShN9Nk/hvZjudyuTP6kzcBRxQtvQaZxuqcM+Z1+MaSjj0blHnSq:lVNwpXuTiGcD2toExqZ1DauQx7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0114025fec63d213c0f6666c1e26facb.exe
    "C:\Users\Admin\AppData\Local\Temp\0114025fec63d213c0f6666c1e26facb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\is-93FIO.tmp\0114025fec63d213c0f6666c1e26facb.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-93FIO.tmp\0114025fec63d213c0f6666c1e26facb.tmp" /SL5="$140040,1822336,54272,C:\Users\Admin\AppData\Local\Temp\0114025fec63d213c0f6666c1e26facb.exe"
      2⤵
      • Executes dropped EXE
      PID:3740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-93FIO.tmp\0114025fec63d213c0f6666c1e26facb.tmp

    Filesize

    168KB

    MD5

    f26ede109648d93e8002ff2a2e0fa5c9

    SHA1

    ea607ac1939612208d836eba4b520e648e320788

    SHA256

    78c1c4f4c53450f3a8c78df4f047e7c4f7de08c9ce98870c360dbdf8dd896c2b

    SHA512

    935a1d35f8bf8e28beecb1109acaecc1fa7789eceea8a5d4a6c2dacdb9da7a719f5610656e8475304093bbd407729eafe6956f1973a5ecc8a22f34a94917cea7

  • C:\Users\Admin\AppData\Local\Temp\is-93FIO.tmp\0114025fec63d213c0f6666c1e26facb.tmp

    Filesize

    166KB

    MD5

    3fbb6e30a3a96771365b47200df6259a

    SHA1

    0591d9ecfd1fe114d823031a949a0fab4da034be

    SHA256

    7f6b68c2ab477c9c9e97efd730ab326865a6537a5c3094b3d5789b3dfcdccdc7

    SHA512

    9e0375062b34f24dbe5e95bb6ecc35b163029a44cca805e27cc60507ff1f0871b8218df11a5c68639d161c4ff79d843bc8e47e2152cc058d0d99cd2e3fd24ebd

  • memory/2208-2-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2208-0-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/2208-17-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/3740-7-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB

  • memory/3740-18-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/3740-21-0x0000000002100000-0x0000000002101000-memory.dmp

    Filesize

    4KB