Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 15:11

General

  • Target

    bwyysetup.exe

  • Size

    2.4MB

  • MD5

    8dd80d04594f91926c7f5ad835ed9597

  • SHA1

    5fd73ce5d98ae253d871ef2fda9fd94a20e790a7

  • SHA256

    50ea0b1ddf1a111cd2af55fef4f69907001c901152041e4de808f5240c6dbac2

  • SHA512

    2f39eb7b35c887459515ef6ba004677f00740defff166048cdb1d0954d76d4f370d1335352733f12d91f87ee9f2c5a21df8f8fd882ac431022e1f6e205ede291

  • SSDEEP

    49152:kGhoGNvFYvXCFRPuMOCmQgQICm8A1VasjE+iEujy3xDE4VHmEa9xD+pS:ZhoGAs8MOvnaiUsjTiEujiDE+GEa9xJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bwyysetup.exe
    "C:\Users\Admin\AppData\Local\Temp\bwyysetup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Users\Admin\AppData\Local\Temp\is-ATUG1.tmp\is-NKTSL.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ATUG1.tmp\is-NKTSL.tmp" /SL4 $70064 "C:\Users\Admin\AppData\Local\Temp\bwyysetup.exe" 2274069 51200
      2⤵
      • Executes dropped EXE
      PID:3388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-ATUG1.tmp\is-NKTSL.tmp

    Filesize

    645KB

    MD5

    b648dcea8917936fb4eddbea705ac5b4

    SHA1

    d78a35c8bae12e63aac254250f1e0ace1a1f296a

    SHA256

    af8f25091dea9d69bba24be8ed54ae8d5bb9d48fcc1467a80d4b0a161c585e82

    SHA512

    e333271ed2a541db8fddd4a3b16b87ff4db923658bff7d703ab3d372cc857c6ade043abad6285584425c17610bc5587ef1477ca66a79c9412a3244856d2c8cdc

  • memory/2720-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2720-2-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2720-13-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3388-10-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/3388-14-0x0000000000400000-0x00000000004B1000-memory.dmp

    Filesize

    708KB

  • memory/3388-17-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB