Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 16:44

General

  • Target

    8a05e19241d7e5d275497b25596f3962.exe

  • Size

    9.3MB

  • MD5

    8a05e19241d7e5d275497b25596f3962

  • SHA1

    08ea75301ee078940a2e43f0a9e124dd0485c9a5

  • SHA256

    a8c4f47f7a96d085c5badb6c04b498e8ea59faa8f89529bd545291856ddd9f33

  • SHA512

    9be424b795fd4128b9ae826fab04a1a23c311eed1b39e7cff6cc7f031f3d3dcfe767761449ac6ee01b27e6f7bb85f089637743cda91527533bc8fa08d4a9526f

  • SSDEEP

    196608:Y5QISFTFECL24qaj6tX/tRvc9rdybE+1JLzOoLxhETR1GFYXiaPhwWXs:YehTjVj61z0CbE0xmTXKYXhT8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a05e19241d7e5d275497b25596f3962.exe
    "C:\Users\Admin\AppData\Local\Temp\8a05e19241d7e5d275497b25596f3962.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\is-IIJL1.tmp\is-0JH3P.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IIJL1.tmp\is-0JH3P.tmp" /SL4 $A0068 "C:\Users\Admin\AppData\Local\Temp\8a05e19241d7e5d275497b25596f3962.exe" 9458817 52224
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-IIJL1.tmp\is-0JH3P.tmp

    Filesize

    643KB

    MD5

    036ef63e2f9b138a42d6adb54ec0cd1e

    SHA1

    353db5d438205a726a6d54beb62f9c62638f501d

    SHA256

    71b487f0523f213004766402b22bf86fa0ef9891e940d2a4cb12eba6627e7cc6

    SHA512

    31b8f6e76c8c4f5323f12384c41f6f2b04e58545c121da71e2a4da947a9c0aea9eb05df4f8199cc6dc89bc238577c4e2d5fb4b66e77e1130bc72b6c38f207cc9

  • C:\Users\Admin\AppData\Local\Temp\is-V9G07.tmp\_isdecmp.dll

    Filesize

    32KB

    MD5

    b4786eb1e1a93633ad1b4c112514c893

    SHA1

    734750b771d0809c88508e4feb788d7701e6dada

    SHA256

    2ae4169f721beb389a661e6dbb18bc84ef38556af1f46807da9d87aec2a6f06f

    SHA512

    0882d2aa163ece22796f837111db0d55158098035005e57cd2e9b8d59dc2e582207840bf98bee534b81c368acf60ab5d8ecbe762209273bda067a215cdb2c0c6

  • memory/2180-1-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2180-18-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4896-7-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/4896-19-0x0000000000400000-0x00000000004CF000-memory.dmp

    Filesize

    828KB

  • memory/4896-22-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB