Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/01/2024, 17:46

General

  • Target

    684048089ee484527f120d8df7bf6d70.exe

  • Size

    2.0MB

  • MD5

    684048089ee484527f120d8df7bf6d70

  • SHA1

    3bace80bf9a7e5db2ac673654b0c4450ba5f2a1d

  • SHA256

    b42793d6a79d31e909d4ea430fd1f1e6e8196ee196b2fca29583099f570af1bd

  • SHA512

    ed7e3df0c73813d9c4bb62567140aa5f3fd0cc23cc82f5854e68f37f1bdb3ef2d778750f1883d1304e696c7a3d6400909ba309b8da79064f63f8bbb45ff69fb9

  • SSDEEP

    49152:BhTKHsUJsDIxzsPEgkCUTJaGvQniB7jdFuxXtV5252LM87L9T65NbK:B4/d9U/UTJapsWXtV5wKx7xTyFK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\684048089ee484527f120d8df7bf6d70.exe
    "C:\Users\Admin\AppData\Local\Temp\684048089ee484527f120d8df7bf6d70.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Users\Admin\AppData\Local\Temp\is-0RUGN.tmp\684048089ee484527f120d8df7bf6d70.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0RUGN.tmp\684048089ee484527f120d8df7bf6d70.tmp" /SL5="$80040,1645754,141824,C:\Users\Admin\AppData\Local\Temp\684048089ee484527f120d8df7bf6d70.exe"
      2⤵
      • Executes dropped EXE
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-0RUGN.tmp\684048089ee484527f120d8df7bf6d70.tmp

    Filesize

    1.1MB

    MD5

    7b8abc441b2182fc23aadcea3d77829f

    SHA1

    2f5e39cfa1445c57487439d3900a333f8aa88467

    SHA256

    b2bcfab22c960440b361328ff89e5f2ee6cf525bbce1d3679c11beac1e181fe3

    SHA512

    2beffad9c45c9b5b73773edd1d402f5b6c7794e1effe3ee7dfab245863741c8f12447f0bde10c80a437dc5b8c7abef13850ecb746d3ac607016116e7e5ea66e2

  • memory/2116-7-0x0000000002540000-0x0000000002541000-memory.dmp

    Filesize

    4KB

  • memory/2116-13-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/2116-17-0x0000000002540000-0x0000000002541000-memory.dmp

    Filesize

    4KB

  • memory/4544-0-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4544-2-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/4544-12-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB