Resubmissions

15-07-2024 19:38

240715-ycsreawclm 10

25-01-2024 13:41

240125-qy6ldshegm 7

08-10-2023 17:09

231008-vn4fhaef3x 7

Analysis

  • max time kernel
    148s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2024 13:41

General

  • Target

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe

  • Size

    244KB

  • MD5

    f93f91aca8e20bb97f94c05e5dd839e7

  • SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

  • SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

  • SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • SSDEEP

    3072:SQ6ZYZTzp+cavEcNQe9GQM/HhdFlQuq0/1fvZDqf6tHFzSfV91puBYYJCslb:n6s8ca7DGQM/HHFlQuTYZpylb

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe
    "C:\Users\Admin\AppData\Local\Temp\6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c.exe"
    1⤵
    • Deletes itself
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:5020
    • C:\Users\Admin\AppData\Roaming\Custom_update\Update_71b8d453.exe
      \??\C:\Users\Admin\AppData\Roaming\Custom_update\Update_71b8d453.exe
      2⤵
      • Executes dropped EXE
      PID:2916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Custom_update\Update_71b8d453.exe

    Filesize

    244KB

    MD5

    f93f91aca8e20bb97f94c05e5dd839e7

    SHA1

    c11d361560b3a397e98334b4bed7d787b46f3e2e

    SHA256

    6ae543b0a3380779b65bff8c3ca0267f741173aed0d35265d6c92c0298fb924c

    SHA512

    fdfe968a6df01a5a25e112159a131c105dbf87424c7f621b013ffe0e03ea27ad233e5cc6464dd19bcf6be1cf3b9657400b4f2fdd65a2067d7de493ec0bee7791

  • memory/2916-7-0x000001F2C2AB0000-0x000001F2C2AC2000-memory.dmp

    Filesize

    72KB

  • memory/2916-9-0x000001F2C2AB0000-0x000001F2C2AC2000-memory.dmp

    Filesize

    72KB

  • memory/2916-12-0x000001F2C4E60000-0x000001F2C4EF9000-memory.dmp

    Filesize

    612KB

  • memory/2916-14-0x000001F2C2AB0000-0x000001F2C2AC2000-memory.dmp

    Filesize

    72KB

  • memory/5020-0-0x0000020682AA0000-0x0000020682AC5000-memory.dmp

    Filesize

    148KB

  • memory/5020-1-0x0000020682AD0000-0x0000020682AE2000-memory.dmp

    Filesize

    72KB

  • memory/5020-5-0x00007FF70C460000-0x00007FF70C4A4000-memory.dmp

    Filesize

    272KB

  • memory/5020-6-0x0000020682AD0000-0x0000020682AE2000-memory.dmp

    Filesize

    72KB