Analysis

  • max time kernel
    137s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2024, 09:29

General

  • Target

    cdb34600aa9741d3966a24b39fbe75bb.exe

  • Size

    980KB

  • MD5

    cdb34600aa9741d3966a24b39fbe75bb

  • SHA1

    4838f81ca17c5bb2e44e14b55b17f37c102dfdc0

  • SHA256

    b1dc94657393b66d837e9fe510a20f573a7529ee88be87d94531befabe4ef078

  • SHA512

    6f5b3be9c84b4b2b4045f5cd948ed34917b0f83716d8cabd6ab97ebb64f084101338c0112e23dd999bbc46ea6663b9b24e35c8760b73d8f68ade98a9a1513b21

  • SSDEEP

    12288:OeuKz5I1qHhwlWoflw5Dze6WBWtmqYk4M0:tnVI1qBwl9fIzO+mqY3M0

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdb34600aa9741d3966a24b39fbe75bb.exe
    "C:\Users\Admin\AppData\Local\Temp\cdb34600aa9741d3966a24b39fbe75bb.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Users\Admin\AppData\Local\Temp\~027653.exe
      C:\Users\Admin\AppData\Local\Temp\~027653.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\~027653.exe
        C:\Users\Admin\AppData\Local\Temp\~027653.exe
        3⤵
        • Executes dropped EXE
        PID:4568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~027653.exe

    Filesize

    969KB

    MD5

    1129618eb1a3422d5beda6439f4c30f1

    SHA1

    fa0627cd250d62431b2a732da71615dec1b7464a

    SHA256

    098496e5553af91b5ba1de8b835d426fa19ba3b6bfeb2f90f9a91fd28a6145ca

    SHA512

    37a2cf100520b39530e6f2a112c0678ec336d86078f65bcc96b779ce5fad1ca7cacddeb912cf61c1beccaa73888dc08876089469c766db2a6224d1f271abbf62

  • memory/3364-23-0x0000000002200000-0x0000000002210000-memory.dmp

    Filesize

    64KB

  • memory/3364-17-0x0000000075910000-0x0000000075A00000-memory.dmp

    Filesize

    960KB

  • memory/3364-10-0x00000000020D0000-0x000000000211E000-memory.dmp

    Filesize

    312KB

  • memory/3364-9-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3364-11-0x00000000776F2000-0x00000000776F3000-memory.dmp

    Filesize

    4KB

  • memory/3364-12-0x0000000002320000-0x0000000002330000-memory.dmp

    Filesize

    64KB

  • memory/3364-13-0x0000000002200000-0x0000000002210000-memory.dmp

    Filesize

    64KB

  • memory/3364-29-0x0000000075910000-0x0000000075A00000-memory.dmp

    Filesize

    960KB

  • memory/3364-28-0x00000000020D0000-0x000000000211E000-memory.dmp

    Filesize

    312KB

  • memory/3364-22-0x0000000002320000-0x0000000002330000-memory.dmp

    Filesize

    64KB

  • memory/3364-8-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/3364-18-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3364-15-0x00000000021D0000-0x00000000021E0000-memory.dmp

    Filesize

    64KB

  • memory/3364-26-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/3600-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3600-30-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4568-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4568-25-0x0000000000400000-0x0000000000408960-memory.dmp

    Filesize

    34KB

  • memory/4568-19-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4568-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4568-31-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB

  • memory/4568-33-0x0000000000400000-0x0000000000408960-memory.dmp

    Filesize

    34KB

  • memory/4568-34-0x0000000010000000-0x0000000010013000-memory.dmp

    Filesize

    76KB