Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 19:42

General

  • Target

    cc4383abbf839ac3c0c200373ee58038.exe

  • Size

    1.2MB

  • MD5

    cc4383abbf839ac3c0c200373ee58038

  • SHA1

    6d83395bc8f02eee1a527727c14fae2e05a57196

  • SHA256

    3e89cb79bf8475e6d5fa89874a5082ff750948eae4556152ab4076547b50ee08

  • SHA512

    2c49a89dda7a025139ddbfe6a8d10b3ef0427de6ac8248d680c1856c96313deff572b8af8ae848d1629fb27d2709d603e5b8d6045a0fa7089a787eb6191fd946

  • SSDEEP

    24576:v2UZV45KFnFBRYJVxYYcbFENHH4gBllXfMZxf5pPxz48CR/x8YaXag:v2OJ7QHcxEuAllPMZxf5L2taV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc4383abbf839ac3c0c200373ee58038.exe
    "C:\Users\Admin\AppData\Local\Temp\cc4383abbf839ac3c0c200373ee58038.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\is-KH5ES.tmp\cc4383abbf839ac3c0c200373ee58038.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-KH5ES.tmp\cc4383abbf839ac3c0c200373ee58038.tmp" /SL5="$70090,1052571,53248,C:\Users\Admin\AppData\Local\Temp\cc4383abbf839ac3c0c200373ee58038.exe"
      2⤵
      • Executes dropped EXE
      PID:2384

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-KH5ES.tmp\cc4383abbf839ac3c0c200373ee58038.tmp

          Filesize

          669KB

          MD5

          52950ac9e2b481453082f096120e355a

          SHA1

          159c09db1abcee9114b4f792ffba255c78a6e6c3

          SHA256

          25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

          SHA512

          5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

        • memory/2384-10-0x00000000007A0000-0x00000000007A1000-memory.dmp

          Filesize

          4KB

        • memory/2384-15-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/2384-18-0x00000000007A0000-0x00000000007A1000-memory.dmp

          Filesize

          4KB

        • memory/2428-1-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2428-13-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB