Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 03:47

General

  • Target

    8e23232583859fe5e31caf3db27fb6f6.exe

  • Size

    61KB

  • MD5

    8e23232583859fe5e31caf3db27fb6f6

  • SHA1

    99da5bcef8c09cb87e0fac28ea3eb094fb9186fc

  • SHA256

    d12e401525c316a381a7521d1d411dde756450f73732c03008f4c9c850ef3134

  • SHA512

    9954b029856f8e8c8130433d91d3a85bf9dc6bcd76ff8659cda0931c79e2e82daeaa5afce32af948f10a734cf122c70272d5a57a1f71bd25d0db9ab4bf8637a3

  • SSDEEP

    1536:brqWVs15u2n21h5GvyJ2McgOxFVdTpFYcPs/7xYpyg:BVeZ0VwFVdFet/2g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e23232583859fe5e31caf3db27fb6f6.exe
    "C:\Users\Admin\AppData\Local\Temp\8e23232583859fe5e31caf3db27fb6f6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\SmcSVR.exe
      C:\Windows\SmcSVR.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SmcSVR.exe

    Filesize

    61KB

    MD5

    8e23232583859fe5e31caf3db27fb6f6

    SHA1

    99da5bcef8c09cb87e0fac28ea3eb094fb9186fc

    SHA256

    d12e401525c316a381a7521d1d411dde756450f73732c03008f4c9c850ef3134

    SHA512

    9954b029856f8e8c8130433d91d3a85bf9dc6bcd76ff8659cda0931c79e2e82daeaa5afce32af948f10a734cf122c70272d5a57a1f71bd25d0db9ab4bf8637a3

  • memory/436-4-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-5-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-6-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-7-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-8-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-9-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-10-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-11-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-13-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-14-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-15-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-16-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-17-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4944-18-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB