Analysis

  • max time kernel
    10s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 13:05

General

  • Target

    37389dc9f124408f986ebebdc72e8570.exe

  • Size

    576KB

  • MD5

    37389dc9f124408f986ebebdc72e8570

  • SHA1

    c9c15fbde1408912e34a6e27d5214fed4f167cd7

  • SHA256

    b69e8080b0fb3b07ee7ab5df1e773f8b1ae33e87201f13d6ddd2237da706991a

  • SHA512

    58539f13b248bcec6ae08576f1a3fd008023ccd42594116d5588dbaa0cd41a74f114f0309f69feea06671cbec26ee27eed07f714bc5e12bad5e730c0237bb606

  • SSDEEP

    12288:bmCw7QtPP4pZX7b+80XItQ4SoE1T0c2ZVcgtNFiQHwVV3O:bTntGZLbaItm10DZmGFiiSO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37389dc9f124408f986ebebdc72e8570.exe
    "C:\Users\Admin\AppData\Local\Temp\37389dc9f124408f986ebebdc72e8570.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\STWSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\STWSetup.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Users\Admin\AppData\Local\Temp\is-6AUHH.tmp\STWSetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-6AUHH.tmp\STWSetup.tmp" /SL5="$6011A,234653,140800,C:\Users\Admin\AppData\Local\Temp\STWSetup.exe"
        3⤵
        • Executes dropped EXE
        PID:4820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3672-4-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3672-6-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3672-16-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/4820-11-0x0000000002430000-0x0000000002431000-memory.dmp

          Filesize

          4KB

        • memory/4820-17-0x0000000000400000-0x0000000000536000-memory.dmp

          Filesize

          1.2MB

        • memory/4820-20-0x0000000002430000-0x0000000002431000-memory.dmp

          Filesize

          4KB