Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
FlashImage-v1.0.0.11/flashimage.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
FlashImage-v1.0.0.11/flashimage.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
FlashImage-v1.0.0.11/hb-FlashImage-tem.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
FlashImage-v1.0.0.11/hb-FlashImage-tem.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
FlashImage-v1.0.0.11/新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
FlashImage-v1.0.0.11/新云软件.url
Resource
win10v2004-20231215-en
General
-
Target
FlashImage-v1.0.0.11/flashimage.exe
-
Size
5.6MB
-
MD5
22df6f6adfd442e884165764381ca9cb
-
SHA1
b04863a7915b446830b57803a37af29c191535b0
-
SHA256
df295e80b0a183f534244e6645540cc69fdfbc801e730104e6c02bfdb55eac32
-
SHA512
bed367c01a00cdebae1a0188265f3437ecaa0651a1ea83086054bc85cabdbb7e75a1a44ff80f0db55f25b611f0ba24912f801332266af54ab75995c2cb34a7c7
-
SSDEEP
98304:MoTXBVHQzDyl409GsmYboLaLEfZzXJeQvegsIQ2zvJShouMXTwQfv5cv/KdtVFL:bTDwfylJ9GsLMOLq9XJBvegsahShlCBX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5104 flashimage.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 5104 1772 flashimage.exe 84 PID 1772 wrote to memory of 5104 1772 flashimage.exe 84 PID 1772 wrote to memory of 5104 1772 flashimage.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\FlashImage-v1.0.0.11\flashimage.exe"C:\Users\Admin\AppData\Local\Temp\FlashImage-v1.0.0.11\flashimage.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\is-OKPVU.tmp\flashimage.tmp"C:\Users\Admin\AppData\Local\Temp\is-OKPVU.tmp\flashimage.tmp" /SL5="$B01C4,5583808,53248,C:\Users\Admin\AppData\Local\Temp\FlashImage-v1.0.0.11\flashimage.exe"2⤵
- Executes dropped EXE
PID:5104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD59e30ab5e3f6b43f69f928e6b4fcfd604
SHA1b110f04114c52f2439715cbad3769250dbcdb1b3
SHA256affbe7f0320f9602d8c51468ecb7bc7960df4f62ab1a36c05ac2fe2816d175ba
SHA5128d751d8c8023bbd54ea2ea0969ad9f379d8bf1066980fdd58007e778bdf654e4e13264ac8917be91ac8583ea9ae5536ca600530f413cbd887c234ec60be5a45d