Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-01-2024 23:44

General

  • Target

    3f55ec87d860ff2eb3cb1c579fe7c950.exe

  • Size

    5KB

  • MD5

    3f55ec87d860ff2eb3cb1c579fe7c950

  • SHA1

    9cf30a01b2ccf93b849b86e6507967c8a58575c5

  • SHA256

    1d8a469380e3c1097161b3407d07b5d48aab149619110447ae8c0ce0a75d6b85

  • SHA512

    9ec5cef0b4eb61d8218b879c6cd8a75b91fd40b250c411bc23f53ece9baf74f525f45a87388ff5133774126308eec817cef9f794333d3c9bbb511fee35f03a99

  • SSDEEP

    48:iisByO00YiSWx8vYWEkAlGip7doBMho6bBNtC1ZVBnb:AYiSWxXq2hxY5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f55ec87d860ff2eb3cb1c579fe7c950.exe
    "C:\Users\Admin\AppData\Local\Temp\3f55ec87d860ff2eb3cb1c579fe7c950.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Users\Admin\AppData\Local\Temp\hello world.exe
      "C:\Users\Admin\AppData\Local\Temp\hello world.exe"
      2⤵
      • Executes dropped EXE
      PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hello world.exe

    Filesize

    1KB

    MD5

    42674f041a9b0264d0a6c771191de3d0

    SHA1

    ed41b98e07545eac410da96512720d9f2d9c25ca

    SHA256

    002d353d8a185b7042cc722a0cd154840eebd1e589832179e91065ba16d9d755

    SHA512

    69546e68b8b0bef8bbae2d182fb7741b638bd2cd47636978b2e154d50a21dae17a38362f29875ab2221d2967c620078f0e976fa189082fcbcd7343919df1f41d

  • memory/2648-7-0x0000000002620000-0x0000000002623000-memory.dmp

    Filesize

    12KB

  • memory/2660-10-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2660-11-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB