Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 15:32

General

  • Target

    $_2_/DownloadManager.exe

  • Size

    1.5MB

  • MD5

    2f17c20972f90846a3852b0623adbcf8

  • SHA1

    3716d34297fd2093c0ed80c60082ba952bc1eaec

  • SHA256

    acf7bb30dcafd65c516e13e502b32df59433fa9f27f27840e2ac8c4d3ddc5f41

  • SHA512

    2103ec51862fc8d29ae071ab9ed76eadcf0c5fd4756ad1bc8d554117e34c7fde224bb56e82c38f60fcd596bcab246c79e9a1b64f0192fa180af486f39169c59f

  • SSDEEP

    24576:fHUiKiubpDbtQ75FIshLc9IFy+yTDirIDOQgHnRUhlBu:EpDba75FI4oIY25

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$_2_\DownloadManager.exe
    "C:\Users\Admin\AppData\Local\Temp\$_2_\DownloadManager.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4500

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4500-0-0x00007FFF2E0C0000-0x00007FFF2EA61000-memory.dmp

          Filesize

          9.6MB

        • memory/4500-1-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-7-0x000000001BC00000-0x000000001BC48000-memory.dmp

          Filesize

          288KB

        • memory/4500-10-0x000000001C970000-0x000000001CE3E000-memory.dmp

          Filesize

          4.8MB

        • memory/4500-11-0x000000001CE40000-0x000000001CEDC000-memory.dmp

          Filesize

          624KB

        • memory/4500-12-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-13-0x000000001B3B0000-0x000000001B3B8000-memory.dmp

          Filesize

          32KB

        • memory/4500-14-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-15-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-16-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-18-0x000000001E400000-0x000000001E462000-memory.dmp

          Filesize

          392KB

        • memory/4500-19-0x00000000203C0000-0x0000000020B66000-memory.dmp

          Filesize

          7.6MB

        • memory/4500-20-0x00007FFF2E0C0000-0x00007FFF2EA61000-memory.dmp

          Filesize

          9.6MB

        • memory/4500-21-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-22-0x00007FFF2E0C0000-0x00007FFF2EA61000-memory.dmp

          Filesize

          9.6MB

        • memory/4500-23-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-24-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-25-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-26-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-27-0x0000000000BE0000-0x0000000000BF0000-memory.dmp

          Filesize

          64KB

        • memory/4500-30-0x00007FFF2E0C0000-0x00007FFF2EA61000-memory.dmp

          Filesize

          9.6MB