Analysis

  • max time kernel
    92s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2024 19:00

General

  • Target

    7050c4053e466c58e67b0d8303f338ab.exe

  • Size

    875KB

  • MD5

    7050c4053e466c58e67b0d8303f338ab

  • SHA1

    20f11fa8bf3e890a110468c410716fa4f5c57884

  • SHA256

    14ef98932bc5fbb1c2ec62c2379757843edc781f4d5583eef14751874277ce0f

  • SHA512

    5be9aeb67d9ee64b461c4dd500d0a600e1641421e823399a1ca1e56aa6f0c77d65ead1f80ad222a24a88f226addafa7607e7e0942fa9bfc97bf29633ae278446

  • SSDEEP

    24576:BOMLKmtvPyHu7UtwdOy9pNg4W7HM8mcN+2QHCQX:QiKmHyO4tPp7s8LQB

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe
    "C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe
      "C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4584
  • C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe
    "C:\Users\Admin\AppData\Local\Temp\7050c4053e466c58e67b0d8303f338ab.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d3RQK2bIUAaODd0sAhE\extramod.dll

    Filesize

    73KB

    MD5

    6d07371fc32a05058d034e32afe5db83

    SHA1

    22023abeb6d829f409ecd3463d8034549239a49c

    SHA256

    1d9b3b58330262b04334986dd7748608ceb1f58641d6ce43c51d8663ed576385

    SHA512

    19e94370cc4a1da0aa80584ecb95a2ff5c839d71e33042f95dbbd8e40f1b991e90b9abe965aaf0d639a9ca3b73572ef004f8764407352e94935fe2e6ef226478

  • C:\Users\Admin\AppData\Local\Temp\d3RQK2bIUAaODd0sAhE\loading_screen.dll

    Filesize

    5KB

    MD5

    44dac7f87bdf94d553f8d2cf073d605d

    SHA1

    21bf5d714b9fcab32ba40ff7d36e48c378b67a06

    SHA256

    0e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66

    SHA512

    92c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774

  • C:\Users\Admin\AppData\Local\Temp\d3RQK2bIUAaODd0sAhE\lua51.dll

    Filesize

    97KB

    MD5

    b16a55085bf2dce99fd8597882010061

    SHA1

    eb159583753f8090558e4b878c8a940a9d1294ff

    SHA256

    c942f39504800f6219a02efc988347114ace2ade2f93214cd08c6c235a9a88a1

    SHA512

    d02ef2f86ccd07ddd3871b563feed7431708c6f75520e2239527986f74264ddfd08e6c6350f5f93386f0b9353ad1bf249779e8ee3d9476d1f38c54a67379dc90

  • C:\Users\Admin\AppData\Local\Temp\d3RQK2bIUAaODd0sAhE\shared_library.dll

    Filesize

    166KB

    MD5

    af6d398035862876ca8828b3a10e8ba9

    SHA1

    964a7f91c2a28bb5df69afce99da67f60351ac6b

    SHA256

    4c8bac9969021f422cb337594a21d0cc74cd05503e4df21d7a4d17150392e4b4

    SHA512

    518c7facb2867a25af3c6938622b092712483118a9bcfb2caff633cd0cc8cc6658e3fb4a73acbad5936321e074ec5c85146c4197b7653e6686ea266ffb647368

  • C:\Users\Admin\AppData\Local\Temp\d3RQK2bIUAaODd0sAhE\shared_library.dll

    Filesize

    200KB

    MD5

    a865a0c4ff5e036a811cecadc527471e

    SHA1

    fabc08d74f38b79afbd07e0c426875d8d063996c

    SHA256

    9242243de3bfc8fa082b1d972699592afc76ca67bc69ff7fe6026f748feae63e

    SHA512

    bdcc2f150dd265ba5b8ad8a38fcbcde53a669308823bd4624cbad208e1c404c08a1426855dd230bbf95adc9d46e312c0470f7e90761aac265c1789d4099d9925

  • memory/4972-19-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/4972-22-0x000000007FE30000-0x000000007FE40000-memory.dmp

    Filesize

    64KB

  • memory/4972-28-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/4972-18-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/4972-17-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/4972-14-0x0000000002120000-0x0000000002156000-memory.dmp

    Filesize

    216KB

  • memory/4972-21-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/4972-20-0x000000007FE40000-0x000000007FE50000-memory.dmp

    Filesize

    64KB

  • memory/4972-7-0x0000000000760000-0x0000000000776000-memory.dmp

    Filesize

    88KB