Analysis

  • max time kernel
    158s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 01:30

General

  • Target

    ba2d373f0d9cfa146b965ede778b1dfd.exe

  • Size

    476KB

  • MD5

    ba2d373f0d9cfa146b965ede778b1dfd

  • SHA1

    e1c29a2e9d218f1d20f5a92feb2d2571aee53b6e

  • SHA256

    a1615a4e1adbb2b09624675a61eb63963c2e7cad6a7f966e6258963b84bfe777

  • SHA512

    2a2c1e56df48d7eeb81a2ec44891608362eb593d9c9bec8ec8b2d8f0fbe386786d31c920231aff30dfc9a0f1064d14aec34e9c72e993875dd5a81ecf96179f23

  • SSDEEP

    6144:Y9UyM13yNdqQhw5lmiNmg/4PlYvE+PkQlvxWrA0hP+gnipimHwDATK+cGYnn5/cP:RyM13y1hw5lTOYB0h89HwE+p5jEA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba2d373f0d9cfa146b965ede778b1dfd.exe
    "C:\Users\Admin\AppData\Local\Temp\ba2d373f0d9cfa146b965ede778b1dfd.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\WINDOWS\isass\update.exe
      C:\WINDOWS\isass\update.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:1412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\isass\update.exe

          Filesize

          476KB

          MD5

          ba2d373f0d9cfa146b965ede778b1dfd

          SHA1

          e1c29a2e9d218f1d20f5a92feb2d2571aee53b6e

          SHA256

          a1615a4e1adbb2b09624675a61eb63963c2e7cad6a7f966e6258963b84bfe777

          SHA512

          2a2c1e56df48d7eeb81a2ec44891608362eb593d9c9bec8ec8b2d8f0fbe386786d31c920231aff30dfc9a0f1064d14aec34e9c72e993875dd5a81ecf96179f23

        • memory/1412-5-0x0000000000610000-0x0000000000611000-memory.dmp

          Filesize

          4KB

        • memory/1412-11-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/1412-20-0x0000000000610000-0x0000000000611000-memory.dmp

          Filesize

          4KB

        • memory/1412-63-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/4544-0-0x00000000022F0000-0x00000000022F1000-memory.dmp

          Filesize

          4KB

        • memory/4544-7-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB