Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 15:12

General

  • Target

    5e94c0f064264dffaee5d98e03eaf558c5945475d38162aefc022abc1c4b682e.exe

  • Size

    7KB

  • MD5

    0094f931121b4047ee8c22a04f005d7f

  • SHA1

    36c641e9803593af2d05e1e147c13b1219a7146d

  • SHA256

    5e94c0f064264dffaee5d98e03eaf558c5945475d38162aefc022abc1c4b682e

  • SHA512

    2bf4774e48019a466b2e88c98f4e7863e208d456dd3a547bcc4f82b22f01d29f38aa736e48c378ee0ab66465fc6bdda4f95220136f7fe847a6e48afba8b36eb5

  • SSDEEP

    96:fk+1m1B538+8xvpLXppvYExBrwbfLbnstTDhv0dWAwCzNt:ckmvCHpLXDvYExBrworKWfk

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e94c0f064264dffaee5d98e03eaf558c5945475d38162aefc022abc1c4b682e.exe
    "C:\Users\Admin\AppData\Local\Temp\5e94c0f064264dffaee5d98e03eaf558c5945475d38162aefc022abc1c4b682e.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\System32\notepad.exe" C:\Users\Admin\Pictures\How to recover.enc.txt
      2⤵
        PID:2828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Pictures\How to recover.enc.txt

      Filesize

      208B

      MD5

      a964afa63ef86d7f85aac0abf59631dd

      SHA1

      c0f0127ba04231aa3ca56e1b7778e810814b9546

      SHA256

      767ec9fe96000fd91d0454d4ec04771f7c6d5bbe9bcd3f50e895954a7de6504a

      SHA512

      bd1245a6747d2858d44e39cf8487e1ff31a56204bd13116491209cb794b817d107d59b0777c4c3be71f2fe24e5fc34174c75c07d055ec6b1f3d865167681de71

    • memory/1436-1-0x00000000743D0000-0x0000000074ABE000-memory.dmp

      Filesize

      6.9MB

    • memory/1436-0-0x0000000000800000-0x0000000000808000-memory.dmp

      Filesize

      32KB

    • memory/1436-36-0x00000000743D0000-0x0000000074ABE000-memory.dmp

      Filesize

      6.9MB