Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
de53d34f4f0382ca6b01e740a3c4bc4d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de53d34f4f0382ca6b01e740a3c4bc4d.exe
Resource
win10v2004-20240226-en
General
-
Target
de53d34f4f0382ca6b01e740a3c4bc4d.exe
-
Size
520KB
-
MD5
de53d34f4f0382ca6b01e740a3c4bc4d
-
SHA1
80bb9170e096bbc8c275b5e76b185174b083e05d
-
SHA256
975b37cf53242bfd9d99547e015eee8c4ea039fe68923338c74a52664d2bd487
-
SHA512
5c027cc2a96e754418632378ac7648e7ab1e55e0134341d6b6b4f4e8481715321b3cf1e7929745adb263745de93350ce3e30c5831677703f358c4a6fb37eb941
-
SSDEEP
6144:afxtvln6cIY39woSl/wdh3GUnTr/6EluW1Psv7:afxNF3nNwoSlQ3hT7oWK7
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\TXPlatform.exe de53d34f4f0382ca6b01e740a3c4bc4d.exe File created C:\Windows\SysWOW64\drivers\TXPlatform.exe de53d34f4f0382ca6b01e740a3c4bc4d.exe -
Executes dropped EXE 1 IoCs
pid Process 4772 TXPlatform.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 4772 TXPlatform.exe 4772 TXPlatform.exe 4772 TXPlatform.exe 4772 TXPlatform.exe 4772 TXPlatform.exe 4772 TXPlatform.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4168 wrote to memory of 3828 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 88 PID 4168 wrote to memory of 3828 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 88 PID 4168 wrote to memory of 3828 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 88 PID 4168 wrote to memory of 4772 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 90 PID 4168 wrote to memory of 4772 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 90 PID 4168 wrote to memory of 4772 4168 de53d34f4f0382ca6b01e740a3c4bc4d.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\de53d34f4f0382ca6b01e740a3c4bc4d.exe"C:\Users\Admin\AppData\Local\Temp\de53d34f4f0382ca6b01e740a3c4bc4d.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\82$$.bat2⤵PID:3828
-
-
C:\Windows\SysWOW64\drivers\TXPlatform.exeC:\Windows\system32\drivers\TXPlatform.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4772
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
485B
MD5f2f4516677a8b069dbbd183df7965150
SHA188e18f169f79f625306304928c954ff61aaf131b
SHA256aa3d95b41d5fbf93b70c9cb7d097da82864879d8ba2903a376526904600f3ef6
SHA51231d921158496320b200f956eb47f1ecbae81d7f09454ee00ae575a0d6ee8a26fe962acf83899088f5abc910ab05159e2ddccd4be83db4b6fc0ade966125d3e1a
-
Filesize
444KB
MD5ddca33ddfbc169e13c81b2661f777278
SHA1ae443fe3e1087f05e4e2d8ab9549efa6177ebe07
SHA256d63f50fca6ed71fb54dfa448a2de6b3566188a181076290c38e7f97bc8adcd9a
SHA5124f924878167f8c63092724f2dd2ad7387cfb516572a9cf5e6997686401be8b49a306e1cf5e24590566e5f3f3ab0abf5b82dbce4956b6d03602ba54dd0d820045