Analysis

  • max time kernel
    148s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 08:14

General

  • Target

    AdwareAway.exe

  • Size

    2.2MB

  • MD5

    ef792144b76a560c7aae36266fbb12eb

  • SHA1

    1337333367a107330f827541a51c1cb88fba3d33

  • SHA256

    dd2710b05a127c8b1e086c7cea3127124c42750d2ceda145e98024ca75f9bb95

  • SHA512

    efea39c56bbb8b3217ed48b7a65e2e7d9eae0e6961f015f452addee439691a9822c0a19c10b3cec7c8c1df1371189c9bf7e1fe271772997f1cf78df2baf922a5

  • SSDEEP

    49152:l3gjidnllAOa9Ra/XGZC2jscGJJSZ1WyDD0PUyPR4GAB3BI3:lEcnDEvU23scUSZ1WJvPRuBR8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe
    "C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Users\Admin\AppData\Local\Temp\INS5C1A.tmp
      C:\Users\Admin\AppData\Local\Temp\INS5C1A.tmp /SL3 $501F0 C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe 2340176 2343191 60928
      2⤵
      • Executes dropped EXE
      PID:5092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\INS5C1A.tmp

    Filesize

    345KB

    MD5

    9cf2de1f66ed99f2c3b9e3af3951d9bc

    SHA1

    8d4d22d010c9b9243381507d73724bd9d134b012

    SHA256

    3727307cf3c68bcece871a4af929b4b3cdc8007d5ee7a37c30ce66f5731833c7

    SHA512

    2b239859a511bbc57272720ff76a6130e1392cf4e544014250695d137dfe28e750f6181f1093c47aefd06f76fb5d2d9ac3ca5cb1ad37f5cee3f44bfddb423803

  • memory/3412-8-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/5092-4-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB

  • memory/5092-9-0x0000000000400000-0x0000000000462000-memory.dmp

    Filesize

    392KB

  • memory/5092-13-0x00000000021D0000-0x00000000021D1000-memory.dmp

    Filesize

    4KB