Analysis

  • max time kernel
    163s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 18:53

General

  • Target

    d3caf175fabc265c3cf49125144a4ac1.exe

  • Size

    64KB

  • MD5

    d3caf175fabc265c3cf49125144a4ac1

  • SHA1

    b1fcea8e32c79c49d3812014a3599fb599d009d2

  • SHA256

    e8fcbb9a903ab5bbabf27c37d6333232bb832126f10551bf8a2420dfac616b56

  • SHA512

    35cdaa46f7235c6b87588117ec1a0b10f446dd7f2c858d82d396870e949c67f09d9a55f3dd38ecf94e9594fc1855efb7cc40a9523e8564e2874e63a90d189f60

  • SSDEEP

    768:XANOxr7P+txLHrLIuWqYiCKCGMq0H4c9xaMGFo4K2p/1H5XPXdnh0Usb0DWBi:XAcl7kr4uR+G8H4OaMd2LbrDWBi

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3caf175fabc265c3cf49125144a4ac1.exe
    "C:\Users\Admin\AppData\Local\Temp\d3caf175fabc265c3cf49125144a4ac1.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Windows\SysWOW64\Amhdmi32.exe
      C:\Windows\system32\Amhdmi32.exe
      2⤵
      • Executes dropped EXE
      PID:3356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Amhdmi32.exe

    Filesize

    64KB

    MD5

    7f724d6308b21c8826eeb6b17cd0aeae

    SHA1

    166105e5dd3065281844c10e64a48dcc4b399f61

    SHA256

    ae35107f8464f25132c269ed4c5e3cbd0559a31c3b28de61d50ed2ccc5a4ba8a

    SHA512

    2af103cd10d95f56c1a4a29db5d86b715da7d932525a0507d41610e5868793b5f5f5b45ac785c4a943ae80dd548665750e12fd648172cad067b6bdf0d6c00855

  • memory/3356-10-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3356-12-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3708-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3708-1-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/3708-8-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB