Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 15:39

General

  • Target

    dtsetup.exe

  • Size

    454KB

  • MD5

    079a93a6525a635ba73fcb1e57662dcc

  • SHA1

    0c00d4c0e1534034701825c268bb6103e2d3c80d

  • SHA256

    2501803bc42b23ab867c1ea8ae3bab2eba07cc8116bf36bd9b134cd3fc544605

  • SHA512

    d45dfc1292ea253690618079bb59d4f3fbb1f36d445945da349d329663cd73e95cb10b45255cb55016b10bb27c7cf106851a76295c284fcacba064ce39a3957c

  • SSDEEP

    12288:1mkOy6Q/bQGHlY0Cik8fru+XarFFoBadO4fdzrC0lKBfs3H+a:1fOy6WvHuHinZKrMBkf1nC0l803H+a

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dtsetup.exe
    "C:\Users\Admin\AppData\Local\Temp\dtsetup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\AppData\Local\Temp\is-AFRS5.tmp\is-EJNKM.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AFRS5.tmp\is-EJNKM.tmp" /SL4 $60230 "C:\Users\Admin\AppData\Local\Temp\dtsetup.exe" 113049 50688
      2⤵
      • Executes dropped EXE
      PID:4976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-AFRS5.tmp\is-EJNKM.tmp

    Filesize

    641KB

    MD5

    fa8621bfc44318a0e45e5a3414345318

    SHA1

    29de99e82aa87911d0761c95632ffec405164d93

    SHA256

    6297413b839879d5ca391c1b8a3568bb07bee509748bcc6aa5b9906eaab8ae84

    SHA512

    797d3a9167b200f5eb8c2077d0e72d3359e602c8a665d6f0bec95387e7a8ffa5e7d4f3a0a827eb0cfb6f17392a8856624c01d9f5231d67d619dcc982c5ede1dc

  • memory/4832-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4832-2-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4832-13-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/4976-7-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/4976-14-0x0000000000400000-0x00000000004B0000-memory.dmp

    Filesize

    704KB

  • memory/4976-17-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB