Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 17:25

General

  • Target

    9c3d6192ba68e46624894e4f0136d8d4.exe

  • Size

    8.4MB

  • MD5

    9c3d6192ba68e46624894e4f0136d8d4

  • SHA1

    7c697bb80dc6a41d1f54468acd6a7bd77ee35533

  • SHA256

    7c6e588ecef08afdc346bbc8cc2c0e143798e127fcdc4c41352858b2c614cf2a

  • SHA512

    6c6bd78fdd22ad2fb69be5421ae088c345d510a3e73c1ec203be4476917e088792777e500b3348fae2917b361deb7237b6a06d56a5ae62a4bbd8a2a4bdbd5728

  • SSDEEP

    196608:XkT+14Gq1DSJkkqe+QQZf0lhgGpphi5LoJ/y5K9de6wL:X54Gq1m6X9oNpz2LoJ/y5KwL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c3d6192ba68e46624894e4f0136d8d4.exe
    "C:\Users\Admin\AppData\Local\Temp\9c3d6192ba68e46624894e4f0136d8d4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4724
    • C:\Users\Admin\AppData\Local\Temp\gikWp\rdxYDEC.exe
      rdxYDEC.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\gikWp\HYiLDBD

    Filesize

    1.2MB

    MD5

    9e469715df9450ad6f46bedfa26d5cf4

    SHA1

    7a62364d0e96e0c1c88b05b314ea1e534ee7a807

    SHA256

    c8bcef5710e64466a8f40cc683ab275cff116a9e4486670e909d82522d64dd42

    SHA512

    8a5d9c7a10dc6653c7d27e0769effd31055cd749cd5d66fe9cc97579203559df9266351ebd982777ff0b260f03457d671046ec8db99df5bc8cee4dbde17535b8

  • C:\Users\Admin\AppData\Local\Temp\gikWp\rdxYDEC.exe

    Filesize

    47KB

    MD5

    761f7858d8b65eb884d387fd96da0b0d

    SHA1

    b68f78367c6d36026b75715d2906cbac65cef1dd

    SHA256

    88cba66e9c7e8d35e440026a0cfaa67882535faec3f5805d3aa2b3110e41fe76

    SHA512

    2378963b482da68ff20e0b1721cd33a2655c3a2df2ae49f81c501c94c0616ed8d935fb55963e909db7e0aa46f57b3c5f645af6e3a3e477c7415166acb99e200c

  • memory/2768-6-0x0000000001EE0000-0x0000000001F60000-memory.dmp

    Filesize

    512KB

  • memory/2768-26-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

    Filesize

    4KB

  • memory/2768-29-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2768-31-0x0000000001EE0000-0x0000000001F60000-memory.dmp

    Filesize

    512KB