Analysis
-
max time kernel
10s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:05
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
37389dc9f124408f986ebebdc72e8570.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
37389dc9f124408f986ebebdc72e8570.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
37389dc9f124408f986ebebdc72e8570.exe
-
Size
576KB
-
MD5
37389dc9f124408f986ebebdc72e8570
-
SHA1
c9c15fbde1408912e34a6e27d5214fed4f167cd7
-
SHA256
b69e8080b0fb3b07ee7ab5df1e773f8b1ae33e87201f13d6ddd2237da706991a
-
SHA512
58539f13b248bcec6ae08576f1a3fd008023ccd42594116d5588dbaa0cd41a74f114f0309f69feea06671cbec26ee27eed07f714bc5e12bad5e730c0237bb606
-
SSDEEP
12288:bmCw7QtPP4pZX7b+80XItQ4SoE1T0c2ZVcgtNFiQHwVV3O:bTntGZLbaItm10DZmGFiiSO
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3672 STWSetup.exe 4820 STWSetup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3672 4764 37389dc9f124408f986ebebdc72e8570.exe 52 PID 4764 wrote to memory of 3672 4764 37389dc9f124408f986ebebdc72e8570.exe 52 PID 4764 wrote to memory of 3672 4764 37389dc9f124408f986ebebdc72e8570.exe 52 PID 3672 wrote to memory of 4820 3672 STWSetup.exe 53 PID 3672 wrote to memory of 4820 3672 STWSetup.exe 53 PID 3672 wrote to memory of 4820 3672 STWSetup.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\37389dc9f124408f986ebebdc72e8570.exe"C:\Users\Admin\AppData\Local\Temp\37389dc9f124408f986ebebdc72e8570.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\STWSetup.exe"C:\Users\Admin\AppData\Local\Temp\STWSetup.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\is-6AUHH.tmp\STWSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-6AUHH.tmp\STWSetup.tmp" /SL5="$6011A,234653,140800,C:\Users\Admin\AppData\Local\Temp\STWSetup.exe"3⤵
- Executes dropped EXE
PID:4820
-
-