Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/02/2024, 03:42

General

  • Target

    2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe

  • Size

    2.0MB

  • MD5

    273b0d2634b3d34a25362054f0667c3c

  • SHA1

    1545fbb6a47e03c2b12063b8bb56e759be048711

  • SHA256

    2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3

  • SHA512

    875892a7da8aab628c532e62a6d465d15b301b2051f1e016d0155912862a2483b1fa7361ee3ec28dcd733e2de9b1bb79d3712c85762d4cdb76eec194b55de061

  • SSDEEP

    24576:x2JyxpC4V1y2I6VsjgjI45bl9Mbonwap41+zzPTThwv3EJp:Ak3Cy1L/VsjgjI45TMwwapIgT5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe
    "C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.tmp
      C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.tmp
      2⤵
      • Executes dropped EXE
      PID:3264
    • C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm
      C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm /zhj
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Windows\GOG.exe
        C:\Windows\GOG.exe /zhj
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        PID:5932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.mm

          Filesize

          448KB

          MD5

          2f27ad0f9238059fefebf8c12b203ca6

          SHA1

          df95aa09aa7d473e3ff63d7bc983b1c737291ca3

          SHA256

          9c447d77d39ad42459d7584818929b0ac19f17aa079f57fba1df031a4896bb37

          SHA512

          3e7b6c41f92dd47d4ee28596a69b7a9608ea713b226675fc8506db6db185a6b081361e6c98778f40f776bd56f37f02d761f6eddde1abe081c2eb5bcb55a9c963

        • C:\Users\Admin\AppData\Local\Temp\2a7e5b92c0d7c1b71f9aa8276c3afc552106a15d6129c875b761b4727cc78fc3.tmp

          Filesize

          1.6MB

          MD5

          7be1cbe3357f110cd18e7af2db40f03f

          SHA1

          c36bd53bd5a286b71f4ee8ad75a95c3e7a66cf77

          SHA256

          52452d8cceba90889cf11e9ac12be930839606196fd61f0dc7da98c694d9d5e4

          SHA512

          c639b8716a27a54898ead7af006c0bf0494820ad9ca1f7d6a75f8b08a8c8ed98bb7bb62ec99faa7af40b5ccafe38a672502cbd576f8b496f79bebdf0f8a0e9f7

        • memory/316-0-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/316-68-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/3540-12-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/3540-17-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/5932-16-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB

        • memory/5932-69-0x0000000000400000-0x000000000045C000-memory.dmp

          Filesize

          368KB