Analysis

  • max time kernel
    276s
  • max time network
    330s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/01/2024, 16:55

General

  • Target

    message.html.exe

  • Size

    21KB

  • MD5

    a35b6c09b913d671ec01d04e243f73a1

  • SHA1

    d6af33c875d59f757126c088049de13b992de1ec

  • SHA256

    279591b86ee4b64d7d54759e2843c37580108036a148e8f5197106a45c0d4612

  • SHA512

    20a3392083935097f795bb921dccec816234f7b37d98119fc67aed06c2ddde0931b37adf7a8a4c7a70462bfba562ce2c548f668191e5b8f14b5431d70e840b6b

  • SSDEEP

    384:FZcpzCIqdG3A3WUkx38GZDJuJbf1+o44u8gHzU7Wby:SCIqdH/k1ZVcT194jp47n

Score
7/10

Malware Config

Signatures

  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\message.html.exe
    "C:\Users\Admin\AppData\Local\Temp\message.html.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    PID:4668
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:4628
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
        PID:1292

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\Common Files\microsoft shared\ink\ar-SA\index.exe

              Filesize

              21KB

              MD5

              a35b6c09b913d671ec01d04e243f73a1

              SHA1

              d6af33c875d59f757126c088049de13b992de1ec

              SHA256

              279591b86ee4b64d7d54759e2843c37580108036a148e8f5197106a45c0d4612

              SHA512

              20a3392083935097f795bb921dccec816234f7b37d98119fc67aed06c2ddde0931b37adf7a8a4c7a70462bfba562ce2c548f668191e5b8f14b5431d70e840b6b

            • memory/1292-344-0x0000025382B40000-0x0000025382B50000-memory.dmp

              Filesize

              64KB

            • memory/1292-328-0x0000025382A40000-0x0000025382A50000-memory.dmp

              Filesize

              64KB

            • memory/1292-362-0x000002538AE50000-0x000002538AE51000-memory.dmp

              Filesize

              4KB

            • memory/1292-363-0x000002538AE50000-0x000002538AE51000-memory.dmp

              Filesize

              4KB

            • memory/1292-364-0x000002538AF60000-0x000002538AF61000-memory.dmp

              Filesize

              4KB

            • memory/1292-360-0x000002538AE20000-0x000002538AE21000-memory.dmp

              Filesize

              4KB

            • memory/4668-22-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-324-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-122-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-163-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-261-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-305-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-308-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-310-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-311-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-321-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-322-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-108-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-326-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-327-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-0-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-11-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-9-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-7-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-4-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-3-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB

            • memory/4668-365-0x0000000000800000-0x000000000080D000-memory.dmp

              Filesize

              52KB