Analysis

  • max time kernel
    164s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 12:59

General

  • Target

    DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe

  • Size

    347KB

  • MD5

    5fab6fbdff1a72cd5eafdd27b5ee11a9

  • SHA1

    de7ced27456a1e4581d6a4bf126f56061b7f9859

  • SHA256

    e7f3335dee2769cf1c920f8977e7bcba6b1cab68a5b66b530ca704c3d32f47d1

  • SHA512

    c52aca48d67fdd929bbb096c93e5673df38c0698e424724bb8501e75f47e39a9f178699370960bb2a2765ce2be162ba5fc4e3652e233ff3c3980f370b3c52ebd

  • SSDEEP

    6144:JwHysR3K1IW9ngXmzmBxfNy7CYJ9POvBx1qdDTQ2yoXAVFm5SofXBdh+vzTfsk9:y9WZ901y1J9UqpTQPGZBfFu

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
    "C:\Users\Admin\AppData\Local\Temp\DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe
      "C:\Users\Admin\AppData\Local\Temp\DE7CED27456A1E4581D6A4BF126F56061B7F9859.exe"
      2⤵
      • Drops startup file
      PID:3188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsbC98B.tmp\diversion.dll

    Filesize

    20KB

    MD5

    481b2eed94394d3942ff75419e585277

    SHA1

    1bd2fc36ad7fe4840db4900a1e87694754b9216f

    SHA256

    f92af591071b79612550036f8fa711c65aff534e958cdf218731184d064c5899

    SHA512

    24bebd15a4396477359a302125cc259efd7c28806393b5d4b11f783f69a1c92f5a951f9d5a446abea64cff2c166681eaa4095f59c772ffc9cdc5ca89ee6eee86

  • memory/3188-6-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/3188-10-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/3188-12-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/3188-14-0x0000000000B40000-0x0000000000B42000-memory.dmp

    Filesize

    8KB

  • memory/3188-15-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB

  • memory/3188-17-0x00000000021C0000-0x00000000021C1000-memory.dmp

    Filesize

    4KB

  • memory/3188-18-0x0000000000400000-0x0000000000533000-memory.dmp

    Filesize

    1.2MB