Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 21:32

General

  • Target

    3b1aba8b59423d767a22ffb3a87d9dd4.exe

  • Size

    134KB

  • MD5

    3b1aba8b59423d767a22ffb3a87d9dd4

  • SHA1

    829b9a9d502e0501a075b2403269d8b72fea1a4e

  • SHA256

    3e88401f9d0f48e4014aa3f14d5f99254dc6c93f815b8f9a3492c260a637db52

  • SHA512

    2c5862db625b64546de1c815de727e11eb01a915ad37b4d8ae0c5b51e1163f441155f2c3afdefeedfb80d485a2d38d54d6545871541e76fda5c4e98ff3f0757f

  • SSDEEP

    3072:/nOn7t7XpdpCCTg/sxFgJMeq8KYCC1fIK/xR+Y/fOpA5g3p+XkaW3:/KpdcCrTv8KxCz/N/2pd3h

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b1aba8b59423d767a22ffb3a87d9dd4.exe
    "C:\Users\Admin\AppData\Local\Temp\3b1aba8b59423d767a22ffb3a87d9dd4.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3400
    • C:\Users\Admin\AppData\Local\Temp\nsw4B24.tmp\downloadmr.exe
      C:\Users\Admin\AppData\Local\Temp\nsw4B24.tmp\downloadmr.exe /e2635477 /u4f45ec55-b378-460f-9ab0-7f6e5bc06f2f
      2⤵
      • Executes dropped EXE
      PID:4744

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3400-34-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/4744-13-0x0000000074CB0000-0x0000000075261000-memory.dmp

          Filesize

          5.7MB

        • memory/4744-14-0x0000000074CB0000-0x0000000075261000-memory.dmp

          Filesize

          5.7MB

        • memory/4744-15-0x0000000000E20000-0x0000000000E30000-memory.dmp

          Filesize

          64KB

        • memory/4744-27-0x0000000000E20000-0x0000000000E30000-memory.dmp

          Filesize

          64KB

        • memory/4744-26-0x0000000000E20000-0x0000000000E30000-memory.dmp

          Filesize

          64KB

        • memory/4744-28-0x0000000000E20000-0x0000000000E30000-memory.dmp

          Filesize

          64KB

        • memory/4744-30-0x0000000074CB0000-0x0000000075261000-memory.dmp

          Filesize

          5.7MB