Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 21:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3b1aba8b59423d767a22ffb3a87d9dd4.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3b1aba8b59423d767a22ffb3a87d9dd4.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
3b1aba8b59423d767a22ffb3a87d9dd4.exe
-
Size
134KB
-
MD5
3b1aba8b59423d767a22ffb3a87d9dd4
-
SHA1
829b9a9d502e0501a075b2403269d8b72fea1a4e
-
SHA256
3e88401f9d0f48e4014aa3f14d5f99254dc6c93f815b8f9a3492c260a637db52
-
SHA512
2c5862db625b64546de1c815de727e11eb01a915ad37b4d8ae0c5b51e1163f441155f2c3afdefeedfb80d485a2d38d54d6545871541e76fda5c4e98ff3f0757f
-
SSDEEP
3072:/nOn7t7XpdpCCTg/sxFgJMeq8KYCC1fIK/xR+Y/fOpA5g3p+XkaW3:/KpdcCrTv8KxCz/N/2pd3h
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4744 downloadmr.exe -
Loads dropped DLL 2 IoCs
pid Process 3400 3b1aba8b59423d767a22ffb3a87d9dd4.exe 3400 3b1aba8b59423d767a22ffb3a87d9dd4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4744 3400 3b1aba8b59423d767a22ffb3a87d9dd4.exe 19 PID 3400 wrote to memory of 4744 3400 3b1aba8b59423d767a22ffb3a87d9dd4.exe 19 PID 3400 wrote to memory of 4744 3400 3b1aba8b59423d767a22ffb3a87d9dd4.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b1aba8b59423d767a22ffb3a87d9dd4.exe"C:\Users\Admin\AppData\Local\Temp\3b1aba8b59423d767a22ffb3a87d9dd4.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\nsw4B24.tmp\downloadmr.exeC:\Users\Admin\AppData\Local\Temp\nsw4B24.tmp\downloadmr.exe /e2635477 /u4f45ec55-b378-460f-9ab0-7f6e5bc06f2f2⤵
- Executes dropped EXE
PID:4744
-