Analysis

  • max time kernel
    87s
  • max time network
    46s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2024 20:04

General

  • Target

    ac9a11d946a42651544b39bf10331e52.exe

  • Size

    724KB

  • MD5

    ac9a11d946a42651544b39bf10331e52

  • SHA1

    2d3ab1c631e65c3d47e1dced6fbbf652729a23af

  • SHA256

    42297f69e8cd1f6de26901cdf1c30987157e345a291fc2deaa7943fa81128a2e

  • SHA512

    2a76c997cbf2c3d285534b9755f854f96d211a264b3293b32da222b5dd57776e61a1cd56b968f2186d5a4be6f5a22079f729741c962db578a0bc6769aff97711

  • SSDEEP

    12288:71/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0qWIgQjyp/5Z1qwyEHMeF0XxfKzrY:71/aGLDCM4D8ayGMGdWrbgBKzrY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac9a11d946a42651544b39bf10331e52.exe
    "C:\Users\Admin\AppData\Local\Temp\ac9a11d946a42651544b39bf10331e52.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\ProgramData\neccd.exe
      "C:\ProgramData\neccd.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\DumpStack.log.tmp .exe

    Filesize

    1KB

    MD5

    721279614367b85a12c170ea4d9d7880

    SHA1

    3a7f9df3c836aed3b28f008b303947b7eaf4b969

    SHA256

    099a5994ce0b6d182f14b4aedcbbe0aacff770fa061995084a4cb1e0429a5c9e

    SHA512

    aaeb678e78d5bf9badedce282d34d632acfb84c339dbe49254ed58da64b67e5cb3bdeb537c45e46a564bd03ab1198c405aadcccabc00ab6f6c0c96a912b2184e

  • C:\ProgramData\neccd.exe

    Filesize

    1KB

    MD5

    2ff629b5d3035af0edc4ae85ecc127e9

    SHA1

    871aeca2177b474eb2af17d6efb7c9543c36190f

    SHA256

    5e28adea167f45103bf38a69fad433137f8c11da21f2c455b0c85d0b335ea0a7

    SHA512

    71432462e906346f72647228a6b2b653629b539b8c025f69fd6315f62ae0d512b96c624c62139676882991176034985237c8cb0a044b2b44e45059eaf7e2f7be

  • memory/4004-70-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4272-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4272-1-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4272-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB