Analysis

  • max time kernel
    7s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2024 20:35

General

  • Target

    471f7a8dce2fbde506b2121224a6a9bf.exe

  • Size

    876KB

  • MD5

    471f7a8dce2fbde506b2121224a6a9bf

  • SHA1

    c4e20f0b525a9e99b8c93eae575892515129d575

  • SHA256

    24e46b71317dd1765ceff1845c9a3b16f6b514d37bb78e99f89ceca4a12ab252

  • SHA512

    fff6b9b8eb0f97334d7a105c5b73f8b8f3e58b0cf8e188c223836157bb60d8f306a7b2f8730237604f30d25000624e2ef0bd527b46da9569676db7cd9b6d8670

  • SSDEEP

    24576:ZgqMLKmtvPyHu7EgwY97y9pNg4W7HM8mcN+2QHCvL3:ZRiKmHyOg49/p7s8LQG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe
    "C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe
      "C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1880
  • C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe
    "C:\Users\Admin\AppData\Local\Temp\471f7a8dce2fbde506b2121224a6a9bf.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\daKz3K5ZH96rICqcKBR\extramod.dll

    Filesize

    1KB

    MD5

    6d8f3baeb96bf7f3ff72bd37cf03d72f

    SHA1

    847f31c4e13ae35ef04b6f169e6e07cf5f5aebf9

    SHA256

    ad4ae02a27008707c54f2894b5ebf08a83a6fa217c727cd025d272f956bad796

    SHA512

    b143b453115557ea6b59b494e29e48c96a4c591dc1deb1758ad3ecf9c0b1b8dd73bb3e7a0d1c5540145de506ca825d72ae1b46d77478e65465a4ab806082c09f

  • C:\Users\Admin\AppData\Local\Temp\daKz3K5ZH96rICqcKBR\loading_screen.dll

    Filesize

    5KB

    MD5

    44dac7f87bdf94d553f8d2cf073d605d

    SHA1

    21bf5d714b9fcab32ba40ff7d36e48c378b67a06

    SHA256

    0e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66

    SHA512

    92c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774

  • C:\Users\Admin\AppData\Local\Temp\daKz3K5ZH96rICqcKBR\shared_library.dll

    Filesize

    31KB

    MD5

    48abc052199b6c077c6943e526523f70

    SHA1

    768dfafd22359e6c8c6ac665d05b8ebad25f7fd2

    SHA256

    6fdd16c348adc3aa2bf6b085cc4762a91b0f89d9881d5651eaebb770298c475b

    SHA512

    8cbb2b99c2a56e6a8a9634125d0d96813b7f5efa7a000a198f37312f684a2583c85a65bf0cc59e9d70eca9200dd733e1a976392de2229f0dc217b98d8d0d81b5

  • C:\Users\Admin\AppData\Local\Temp\daKz3K5ZH96rICqcKBR\shared_library.dll

    Filesize

    1KB

    MD5

    e6e65003507f01912812d3825219f5a2

    SHA1

    2888ea9fcb1e3b76e6cffed93e6ceb9e8f3932a5

    SHA256

    1e07d0e144b0af14646dafd8a61067544ca5d761bfca08370c330438c626d92a

    SHA512

    5b120a5cd2ebc0030c536ccb0fa6159e452a67efbe8dcf1031690dee024e0d2c31912af797f34ea2d57aa37204da39b56d2efbaad10dc86eed733dc619c5bbe1

  • memory/1152-21-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/1152-19-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/1152-18-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/1152-17-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/1152-20-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/1152-28-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/1152-7-0x0000000002110000-0x0000000002126000-memory.dmp

    Filesize

    88KB

  • memory/1152-14-0x0000000002150000-0x0000000002186000-memory.dmp

    Filesize

    216KB

  • memory/1152-22-0x000000007FE30000-0x000000007FE40000-memory.dmp

    Filesize

    64KB