Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 00:50

General

  • Target

    091a8d4328fb747b6763f39f2afb6fab.exe

  • Size

    877KB

  • MD5

    091a8d4328fb747b6763f39f2afb6fab

  • SHA1

    937048fff666eb21f9bdb6ee6ae69301d9adc428

  • SHA256

    12c2e12ac5b57f8ce67e5176a0888dbe033c012186ce77a36afd47c798de2348

  • SHA512

    4dda40d55d9390c1207b5a55e41590e0ca35a34660e6e9a928cd005b44258a74c468b1ae854e9ee81b694b938a050f2d77f180b1bc08a3aff583b20da7e011d7

  • SSDEEP

    24576:BrMLKmtvPyHu7gChEr0y9pNg4W7HMcYcN+2QHCHW5:9iKmHyOAKp7sclQH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe
    "C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe
      "C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe
        "C:\Users\Admin\AppData\Local\Temp\091a8d4328fb747b6763f39f2afb6fab.exe"
        3⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3904

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\av449l91GPNmyPaSYcm\extramod.dll

          Filesize

          73KB

          MD5

          95d3c812e207a8af8564917f053562b5

          SHA1

          473c2e4f725a84bcb5f8b51586407e46ccc01ef9

          SHA256

          ecae4c2b69438769dfb4a747fe2402e031eaf6d097af976123350cea3063bdc4

          SHA512

          59b8447824440b691176b941b84e38139bdcb2e6715ecafca17fae3eea58f202893ee9b320c780b931bbd975d39a99b8bb4390da1973ade88d139380b1cf86bb

        • C:\Users\Admin\AppData\Local\Temp\av449l91GPNmyPaSYcm\loading_screen.dll

          Filesize

          5KB

          MD5

          44dac7f87bdf94d553f8d2cf073d605d

          SHA1

          21bf5d714b9fcab32ba40ff7d36e48c378b67a06

          SHA256

          0e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66

          SHA512

          92c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774

        • C:\Users\Admin\AppData\Local\Temp\av449l91GPNmyPaSYcm\lua51.dll

          Filesize

          494KB

          MD5

          f0c59526f8186eadaf2171b8fd2967c1

          SHA1

          8ffbe3e03d8139b50b41931c7b3360a0eebdb5cb

          SHA256

          6e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6

          SHA512

          dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854

        • C:\Users\Admin\AppData\Local\Temp\av449l91GPNmyPaSYcm\shared_library.dll

          Filesize

          200KB

          MD5

          46972a016ed397cc25b8de4e9c510227

          SHA1

          08def924894c143d71c79712362e5ac6702c3061

          SHA256

          82b15998fb343dfcecf9dbbdc6ebe09227e175102dff531476714a8d1811cf55

          SHA512

          11036fc021515a4c3fc9e21864beb384e404f5778163bb8363e4c89f2596e4e0434beb57031f4c3c8d3394283dac2190ef53d5c51d6877900f2d3e9618679726

        • memory/3904-18-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/3904-17-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/3904-14-0x00000000007A0000-0x00000000007D6000-memory.dmp

          Filesize

          216KB

        • memory/3904-21-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/3904-20-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/3904-19-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/3904-22-0x000000007FE30000-0x000000007FE40000-memory.dmp

          Filesize

          64KB

        • memory/3904-7-0x0000000000650000-0x0000000000666000-memory.dmp

          Filesize

          88KB

        • memory/3904-28-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB