Analysis

  • max time kernel
    97s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 17:41

General

  • Target

    5c8280c3226fa7078d7dae2f343e255ae2ecda2b0e1ba7348836d967eb35c5aa.exe

  • Size

    277KB

  • MD5

    2f5906278b79fd23837acbf174caeec1

  • SHA1

    e5d9fbcc61665b19d0810d01617e762c3c9d9b99

  • SHA256

    5c8280c3226fa7078d7dae2f343e255ae2ecda2b0e1ba7348836d967eb35c5aa

  • SHA512

    fc99c2c80ca1064923178f5a3baaacb405544b26b44d0c3f3d609a1bb6628be18252a87d44ea9d4f4c8d82f31271a4cb9fd8c02eb2d4aaa12c153fd5c2ba5acc

  • SSDEEP

    6144:6Z1gm4z+Rp4PCL8YM6c2G/FtmUPvo39UPdWNN4:6l4qnM6c26s39hNN4

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c8280c3226fa7078d7dae2f343e255ae2ecda2b0e1ba7348836d967eb35c5aa.exe
    "C:\Users\Admin\AppData\Local\Temp\5c8280c3226fa7078d7dae2f343e255ae2ecda2b0e1ba7348836d967eb35c5aa.exe"
    1⤵
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    • Enumerates connected drives
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4652
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:4936
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:3540
        • C:\Users\Admin\AppData\Local\Temp\5c8280c3226fa7078d7dae2f343e255ae2ecda2b0e1ba7348836d967eb35c5aa.exe
          \\?\C:\Users\Admin\AppData\Local\Temp\5c8280c3226fa7078d7dae2f343e255ae2ecda2b0e1ba7348836d967eb35c5aa.exe -network
          2⤵
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:552
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c pause
            3⤵
              PID:3580

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads