Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
AdwareAway.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AdwareAway.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20231215-en
General
-
Target
AdwareAway.exe
-
Size
2.2MB
-
MD5
ef792144b76a560c7aae36266fbb12eb
-
SHA1
1337333367a107330f827541a51c1cb88fba3d33
-
SHA256
dd2710b05a127c8b1e086c7cea3127124c42750d2ceda145e98024ca75f9bb95
-
SHA512
efea39c56bbb8b3217ed48b7a65e2e7d9eae0e6961f015f452addee439691a9822c0a19c10b3cec7c8c1df1371189c9bf7e1fe271772997f1cf78df2baf922a5
-
SSDEEP
49152:l3gjidnllAOa9Ra/XGZC2jscGJJSZ1WyDD0PUyPR4GAB3BI3:lEcnDEvU23scUSZ1WJvPRuBR8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5092 INS5C1A.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3412 wrote to memory of 5092 3412 AdwareAway.exe 87 PID 3412 wrote to memory of 5092 3412 AdwareAway.exe 87 PID 3412 wrote to memory of 5092 3412 AdwareAway.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe"C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\INS5C1A.tmpC:\Users\Admin\AppData\Local\Temp\INS5C1A.tmp /SL3 $501F0 C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe 2340176 2343191 609282⤵
- Executes dropped EXE
PID:5092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD59cf2de1f66ed99f2c3b9e3af3951d9bc
SHA18d4d22d010c9b9243381507d73724bd9d134b012
SHA2563727307cf3c68bcece871a4af929b4b3cdc8007d5ee7a37c30ce66f5731833c7
SHA5122b239859a511bbc57272720ff76a6130e1392cf4e544014250695d137dfe28e750f6181f1093c47aefd06f76fb5d2d9ac3ca5cb1ad37f5cee3f44bfddb423803