Analysis

  • max time kernel
    148s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 05:17

General

  • Target

    Fresetup.exe

  • Size

    4.9MB

  • MD5

    5150e9139d8eb0ab0002c97815c73984

  • SHA1

    273eb49a9d715f055095ceb68da683bb52f699e3

  • SHA256

    31847b69669b3a2e6e5877ea3b38e276721a61687dcc27a83ec3cbf5d8b60004

  • SHA512

    00e4f6982c167c65d3d89622cde2fba8329257796a4e4b4cbc13db4e837ac73236316bb904306c5afbaece83e1ab4a79ddcbf892829dac6efa07d5dd1900f186

  • SSDEEP

    98304:UapZ5bPekX91SRTz4u9btfZbsn4+WoIm44ndzxpI:3ekiRTzBpF/PSdS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fresetup.exe
    "C:\Users\Admin\AppData\Local\Temp\Fresetup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\is-IV4A3.tmp\is-COG1V.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IV4A3.tmp\is-COG1V.tmp" /SL4 $E0060 C:\Users\Admin\AppData\Local\Temp\Fresetup.exe 4933246 51200
      2⤵
      • Executes dropped EXE
      PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-IV4A3.tmp\is-COG1V.tmp

    Filesize

    610KB

    MD5

    365e4b9988123eef3955a4fb28a9be93

    SHA1

    f2eacd886960eca81ba4c1e1e82f9e70711c296d

    SHA256

    cc85b7b90d427ca6f3b4c25593368bce1337eb475207aeed1ae2f9721b2370f9

    SHA512

    07f90c47216af13b0c059a08e226e3cf3de452f562fb40778195ce82344f6d2e17adc2a3456f618e508fcf1add5348685171ee7c0ec3fefdff327633e63b2991

  • C:\Users\Admin\AppData\Local\Temp\is-IV4A3.tmp\is-COG1V.tmp

    Filesize

    254KB

    MD5

    a4a1c080b222ab414b9d888e182dab83

    SHA1

    c01ac31e32cc2e32cb7650f1010a17c659600f7c

    SHA256

    702113361511e430364f53d719ddd851f1d500cdf5b188e1584f514f55dad399

    SHA512

    5dbcbdc3b197adf076cf5c5f530fd7ba6c688888dd44be73de747d33ea9dafdc52a31e46f6ae37592c7798f655af91a659b14f927ad8ea255f34608064fb66b3

  • memory/2296-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2296-10-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2480-7-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB

  • memory/2480-11-0x0000000000400000-0x00000000004A7000-memory.dmp

    Filesize

    668KB

  • memory/2480-14-0x00000000020F0000-0x00000000020F1000-memory.dmp

    Filesize

    4KB