Analysis

  • max time kernel
    163s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 20:43

General

  • Target

    77609d9a64524ca2b93e563f751da62f94c31419a3641053943d78492f0118e5.exe

  • Size

    482KB

  • MD5

    96bc7429c5307af667ca43e45673b41c

  • SHA1

    99ed383eb21750b30a9e09d07407f97a365deb92

  • SHA256

    77609d9a64524ca2b93e563f751da62f94c31419a3641053943d78492f0118e5

  • SHA512

    822b3174c041e2262eb7d01b71e11cb2af848228891cc5e4af789e13065f12bd1a96533b62b80e935995b752bdbd779721cb13ca837efbaf673c0a16af5ace47

  • SSDEEP

    12288:YClc87eqqV5e+wBV6O+HFF4Dfxow9BWvz+GpMb:YCSqqHeVBx/LCZpMb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\77609d9a64524ca2b93e563f751da62f94c31419a3641053943d78492f0118e5.exe
      "C:\Users\Admin\AppData\Local\Temp\77609d9a64524ca2b93e563f751da62f94c31419a3641053943d78492f0118e5.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Users\Admin\AppData\Roaming\psrexer\disksist.exe
        "C:\Users\Admin\AppData\Roaming\psrexer"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4712
        • C:\Users\Admin\AppData\Local\Temp\~A325.tmp
          3296 493576 4712 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5080
  • C:\Windows\SysWOW64\iexpmsdt.exe
    C:\Windows\SysWOW64\iexpmsdt.exe -s
    1⤵
    • Executes dropped EXE
    PID:1168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~A325.tmp

    Filesize

    8KB

    MD5

    86dc243576cf5c7445451af37631eea9

    SHA1

    99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

    SHA256

    25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

    SHA512

    c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

  • C:\Users\Admin\AppData\Roaming\psrexer\disksist.exe

    Filesize

    482KB

    MD5

    1f5d696a210d5bcc56c0fe871e10909e

    SHA1

    f80bedbc7382c4dfcc6ef0b32a9869b51ed8fa8c

    SHA256

    83a14413849e596614a22a3229ee840eff4b321ded1c91cfc14211d1b78f5b35

    SHA512

    0afec5779f86d09e43ecfa4cf87a9880e2ac6bf9d131b2801323ccf8803b6fd30a9886d1109b7f3de35c516ecdf2c8f69d9b2901bbd590438adf0207f110ae45

  • memory/976-0-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/976-1-0x00000000005B0000-0x0000000000631000-memory.dmp

    Filesize

    516KB

  • memory/976-24-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/1168-15-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/3296-21-0x0000000008980000-0x0000000008986000-memory.dmp

    Filesize

    24KB

  • memory/3296-17-0x0000000008AE0000-0x0000000008B68000-memory.dmp

    Filesize

    544KB

  • memory/3296-14-0x0000000008AE0000-0x0000000008B68000-memory.dmp

    Filesize

    544KB

  • memory/3296-23-0x0000000008990000-0x000000000899D000-memory.dmp

    Filesize

    52KB

  • memory/4712-18-0x0000000000660000-0x0000000000665000-memory.dmp

    Filesize

    20KB

  • memory/4712-16-0x0000000000490000-0x0000000000511000-memory.dmp

    Filesize

    516KB

  • memory/4712-10-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB