Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 23:06

General

  • Target

    59a524c2928595e3e7c8e45ba5f8877d.exe

  • Size

    304KB

  • MD5

    59a524c2928595e3e7c8e45ba5f8877d

  • SHA1

    f6750abb1d9b68d8244f9a6bad6754f0cf55a029

  • SHA256

    77e6fa761983370d075f8cbdaa22280449e732490b7b6841d116edf6037aeec6

  • SHA512

    0efbfc7ef1c873c3b733a5defd9ca5e9695cf2d5ef8cfae7270704268a36c4d781c9f5d37c4ea3c27dbe80525ab915bf8344390e3b84a23cfec71fb997aebb16

  • SSDEEP

    6144:C/0uoLcNe1F6DizTa9uZMlIKGs7LTqy3etzsvDH/xe:CJix1k2q9uZMcsmyxDHZe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59a524c2928595e3e7c8e45ba5f8877d.exe
    "C:\Users\Admin\AppData\Local\Temp\59a524c2928595e3e7c8e45ba5f8877d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10054_~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10054_~1.EXE
      2⤵
      • Executes dropped EXE
      PID:4672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ePSXe.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ePSXe.exe
      2⤵
      • Executes dropped EXE
      PID:1280
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4680
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
    1⤵
    • Checks processor information in registry
    • Modifies registry class
    PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10054_~1.EXE

    Filesize

    89KB

    MD5

    25fc448ee4f93e6f98458fd631e30c6e

    SHA1

    4512de71991eda40509dae5afcc6a80fea9ab631

    SHA256

    b88e4865cc23836275ce6efc2c9f1b2c42ea0c8f34ad90913cdca7f4b48a678f

    SHA512

    654f880fa4f21d22cae423299886ac1cb0d8b380e60dfe1b28a787a838919448411c4a713296aeca11e17e5cc114518ec448f7a3047f6f8f17b8740a5292d9b8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ePSXe.exe

    Filesize

    158KB

    MD5

    861fe2f10e899afadd5a806a80611c2b

    SHA1

    5b374e343858e2061eb909036f13578ee321ef9c

    SHA256

    f2f635dfb6c97aa02a653c435726c908860163e48a834ff6606f5450686ffe18

    SHA512

    2065512ee9c3b2644a55647b22bff6b3bcb8cdd0dc9d84ad052f57d39495fc61fc64c023901b09f1ab0222b91291730fc7f0cf25bfcaca1a759865ea9e2265b5

  • memory/1280-20-0x0000000000400000-0x00000000008E4000-memory.dmp

    Filesize

    4.9MB

  • memory/4672-7-0x00000000006D0000-0x00000000006E8000-memory.dmp

    Filesize

    96KB

  • memory/4672-8-0x00000000029F0000-0x0000000002A08000-memory.dmp

    Filesize

    96KB