Analysis

  • max time kernel
    12s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 07:32

General

  • Target

    2d83a0f0098fecdef97190e94b598a40.exe

  • Size

    3.4MB

  • MD5

    2d83a0f0098fecdef97190e94b598a40

  • SHA1

    8191a14574e49e0884dfd87af748cfbe41777e90

  • SHA256

    a5e58e2473c430b8a85d9fc1ab9c83c0ce61680a635affa994788635e20b1955

  • SHA512

    58e3d98eed52b56baab7126eb229eda3ae6923f105ae06daff4638f094f9303c4311c54ebd3af57cc57c23cab7a78787d51fdfd7566b0d356af66df16529bf49

  • SSDEEP

    98304:iFz73Zt2/4FOfMAB1HbAn8t1VFex52OhS+NCB:iLV8LBFAn8tfFG5zTC

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d83a0f0098fecdef97190e94b598a40.exe
    "C:\Users\Admin\AppData\Local\Temp\2d83a0f0098fecdef97190e94b598a40.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HSlXup4z4.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HSlXup4z4.exe" "C:\Users\Admin\AppData\Local\Temp\2d83a0f0098fecdef97190e94b598a40.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2628
  • C:\Users\Admin\AppData\Local\Temp\2d83a0f0098fecdef97190e94b598a40.exe
    "C:\Users\Admin\AppData\Local\Temp\2d83a0f0098fecdef97190e94b598a40.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2156
  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HSlXup4z4.exe
    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HSlXup4z4.exe" "C:\Users\Admin\AppData\Local\Temp\2d83a0f0098fecdef97190e94b598a40.exe"
    1⤵
    • Executes dropped EXE
    PID:2624
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
        PID:2524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 284
          3⤵
          • Program crash
          PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2156-1-0x0000000002220000-0x000000000261E000-memory.dmp

      Filesize

      4.0MB

    • memory/2156-0-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/2524-88-0x0000000000360000-0x00000000003FE000-memory.dmp

      Filesize

      632KB

    • memory/2524-34-0x00000000000F0000-0x0000000000189000-memory.dmp

      Filesize

      612KB

    • memory/2524-83-0x0000000077E00000-0x0000000077E01000-memory.dmp

      Filesize

      4KB

    • memory/2524-85-0x0000000000360000-0x00000000003FE000-memory.dmp

      Filesize

      632KB

    • memory/2524-86-0x0000000000360000-0x00000000003FE000-memory.dmp

      Filesize

      632KB

    • memory/2524-87-0x0000000077E00000-0x0000000077E01000-memory.dmp

      Filesize

      4KB

    • memory/2524-84-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2524-89-0x0000000000110000-0x0000000000111000-memory.dmp

      Filesize

      4KB

    • memory/2524-27-0x00000000000F0000-0x0000000000189000-memory.dmp

      Filesize

      612KB

    • memory/2524-25-0x0000000000540000-0x0000000001192000-memory.dmp

      Filesize

      12.3MB

    • memory/2524-28-0x00000000000F0000-0x0000000000189000-memory.dmp

      Filesize

      612KB

    • memory/2524-35-0x0000000000360000-0x00000000003FE000-memory.dmp

      Filesize

      632KB

    • memory/2624-23-0x0000000077E00000-0x0000000077E01000-memory.dmp

      Filesize

      4KB

    • memory/2624-30-0x0000000000320000-0x00000000003BE000-memory.dmp

      Filesize

      632KB

    • memory/2624-29-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/2624-24-0x0000000000820000-0x0000000000821000-memory.dmp

      Filesize

      4KB

    • memory/2624-22-0x0000000000320000-0x00000000003BE000-memory.dmp

      Filesize

      632KB

    • memory/2628-19-0x0000000002320000-0x000000000271E000-memory.dmp

      Filesize

      4.0MB

    • memory/2628-20-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/3020-12-0x0000000000400000-0x00000000007FE000-memory.dmp

      Filesize

      4.0MB

    • memory/3020-13-0x0000000005CB0000-0x00000000060AE000-memory.dmp

      Filesize

      4.0MB

    • memory/3020-14-0x0000000005CB0000-0x00000000060AE000-memory.dmp

      Filesize

      4.0MB

    • memory/3020-15-0x0000000000320000-0x00000000003BE000-memory.dmp

      Filesize

      632KB

    • memory/3020-2-0x0000000000320000-0x00000000003BE000-memory.dmp

      Filesize

      632KB