Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2024, 00:27

General

  • Target

    3f6d1002d337c6f139d2ed95854ad715.exe

  • Size

    652KB

  • MD5

    3f6d1002d337c6f139d2ed95854ad715

  • SHA1

    8c4fd8254437ceafd67966f9827f676d57170da7

  • SHA256

    35e109e8faa97a24f3e05db579bb38e71ed5d024e72da95bceebe8abf25b7629

  • SHA512

    114f006079f8b11a90d649e724648d1088c345ba452288e5f064b9b1759bf452d23e1aeb374894cdea65cb08bb06f890bcb34036a9a78e3765a451bcbfc102ac

  • SSDEEP

    12288:sVUE7I+n1C863Sp24ufcTOO26Zw/wrjsMnYjX5/804ZsvT85:sVP11uwOVOw/iIOiX50MvT85

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f6d1002d337c6f139d2ed95854ad715.exe
    "C:\Users\Admin\AppData\Local\Temp\3f6d1002d337c6f139d2ed95854ad715.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\INS96D3.tmp
      C:\Users\Admin\AppData\Local\Temp\INS96D3.tmp /SL3 $110150 C:\Users\Admin\AppData\Local\Temp\3f6d1002d337c6f139d2ed95854ad715.exe 655898 659342 61952
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\INS96D3.tmp

          Filesize

          377KB

          MD5

          9202dd89ff610e35a377a8f644f6b109

          SHA1

          09d69bf6bb6356a0915855190a18e269eb11b66e

          SHA256

          b9d0d8d106ca81c716a8c0fd03ea9e2cb7447fc4901aec62240793f9e42a4d6a

          SHA512

          09ff840ead18ecc55f95e6356a92b869ad1197f94b996ef4b9df317c7ed41e4f87a1f1fda34a7d991a933107bfe6f8312b46c2eaa307f7440da75a0f7ae9a33e

        • \Users\Admin\AppData\Local\Temp\is-746UE.tmp\_shfoldr.dll

          Filesize

          22KB

          MD5

          92dc6ef532fbb4a5c3201469a5b5eb63

          SHA1

          3e89ff837147c16b4e41c30d6c796374e0b8e62c

          SHA256

          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

          SHA512

          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

        • memory/2084-11-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2232-12-0x0000000000400000-0x000000000046A000-memory.dmp

          Filesize

          424KB