Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2024 08:14

General

  • Target

    AdwareAway.exe

  • Size

    2.2MB

  • MD5

    ef792144b76a560c7aae36266fbb12eb

  • SHA1

    1337333367a107330f827541a51c1cb88fba3d33

  • SHA256

    dd2710b05a127c8b1e086c7cea3127124c42750d2ceda145e98024ca75f9bb95

  • SHA512

    efea39c56bbb8b3217ed48b7a65e2e7d9eae0e6961f015f452addee439691a9822c0a19c10b3cec7c8c1df1371189c9bf7e1fe271772997f1cf78df2baf922a5

  • SSDEEP

    49152:l3gjidnllAOa9Ra/XGZC2jscGJJSZ1WyDD0PUyPR4GAB3BI3:lEcnDEvU23scUSZ1WJvPRuBR8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe
    "C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\INS5ACD.tmp
      C:\Users\Admin\AppData\Local\Temp\INS5ACD.tmp /SL3 $500F4 C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe 2340176 2343191 60928
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\INS5ACD.tmp

    Filesize

    256KB

    MD5

    a9d6a46adcee0c06bed665c6dfec3998

    SHA1

    943c112f950ff35c93eeb60108c6f3e5d74da656

    SHA256

    eb4017a1b20ba1384bd1bb736f873caa735ade3eec14a2252c31f73ed6d40f6a

    SHA512

    a0cfb129b36363449c6fd191269b5d5d9f0d44fd3921ec60f612c3c647052cc73b6d9ba5a9c23a3f11e07192b2a43f339338908c669056b27b8052e47a8ff667

  • C:\Users\Admin\AppData\Local\Temp\INS5ACD.tmp

    Filesize

    229KB

    MD5

    4a658ae9c7e7d915aec4a34a416027b9

    SHA1

    d0ec54bab890d5cb5a1533c711fb8a5c09f9b544

    SHA256

    cee9da07b3291dd1e069874ebb235eead6bc3dc849300cb376cc002e04540b2b

    SHA512

    db3dda93143f4cce654e9ce5e6904a23c9a149b193dfff39730b04eb94999ad92cff9d02b63bdd773a50a902674edd13e8930e2ec3d309151b627408d3d63654

  • \Users\Admin\AppData\Local\Temp\INS5ACD.tmp

    Filesize

    345KB

    MD5

    9cf2de1f66ed99f2c3b9e3af3951d9bc

    SHA1

    8d4d22d010c9b9243381507d73724bd9d134b012

    SHA256

    3727307cf3c68bcece871a4af929b4b3cdc8007d5ee7a37c30ce66f5731833c7

    SHA512

    2b239859a511bbc57272720ff76a6130e1392cf4e544014250695d137dfe28e750f6181f1093c47aefd06f76fb5d2d9ac3ca5cb1ad37f5cee3f44bfddb423803

  • \Users\Admin\AppData\Local\Temp\is-ICCMS.tmp\_shfoldr.dll

    Filesize

    22KB

    MD5

    153241df0b44d47db2aa2ee755ea62c9

    SHA1

    4a6beaf3cf09bbcc6acb2382dff47c034c27fafc

    SHA256

    fd3f175e7d31a16e116616ab29c1b672ae4ed08d397fac014d1279b969af3b68

    SHA512

    95f712c21fb677f8ce6578648b6e065357d70523255de7af67471ea3c6e09303eb5adc02bf28f99284f97325181a94f3decdf9882db0d121811e016673f1b990

  • memory/484-15-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/2408-14-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB