Analysis
-
max time kernel
140s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
ExamDiff.Pro.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ExamDiff.Pro.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
keygen.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
keygen.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
ExamDiff.Pro.exe
-
Size
2.9MB
-
MD5
533c8eb8f72d359822d4e92d227f3404
-
SHA1
2b8bddd0f0e03b5e42fe1d414abe308e2d0c80d4
-
SHA256
95a90fab67614efe1748e3ceea05cbc5fae95c85f2f47743fc078ade78207da8
-
SHA512
01372d560402ef784448b6b4d2ec755580d54300caa731dfd7a5a65df1f4aebdb61b36d2fbc622a9908fdc94631eb576904debe810d78983f4603e0e56a76660
-
SSDEEP
49152:dG/Mny0++uIaC6LDGbLoLuQQIVGAlwoS/kJ2qmWLuMIkbqPdpo2ApQUIx83oxl0u:4L0+XdC6LKoxIo7ppuMoj0s9T5VRF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4468 is-NP6NT.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3544 wrote to memory of 4468 3544 ExamDiff.Pro.exe 16 PID 3544 wrote to memory of 4468 3544 ExamDiff.Pro.exe 16 PID 3544 wrote to memory of 4468 3544 ExamDiff.Pro.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExamDiff.Pro.exe"C:\Users\Admin\AppData\Local\Temp\ExamDiff.Pro.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\is-6BAGM.tmp\is-NP6NT.tmp"C:\Users\Admin\AppData\Local\Temp\is-6BAGM.tmp\is-NP6NT.tmp" /SL4 $70206 "C:\Users\Admin\AppData\Local\Temp\ExamDiff.Pro.exe" 2815984 522242⤵
- Executes dropped EXE
PID:4468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
656KB
MD5d07663a3543b51cc749a61725fe2a96e
SHA17882912ba30b6b5e0b127d643a8116a22a1e5036
SHA256cf116e77f36469b510f0eb8ba6377bfa756f12513120168fb5a19665324357b5
SHA512cf21d16716cde72043d38ec94c8a9fcf7a69d79e84b6f3a7140f733731fe5ceb5de76cc4b305e913600614ff007973ac10251cdbda09b1df5521821d0886743b