Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 23:47

General

  • Target

    be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe

  • Size

    289KB

  • MD5

    abebffab827f05fb44f8b40b23c15764

  • SHA1

    a907312f51ac938af80cdbecf238c99147ad3208

  • SHA256

    be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018

  • SHA512

    07c101c70e05dfd6db8c2fe2780e8cfdb9be837f8bbb207636a863275a652008de0b423b3c1be6dd673d3c2421fac7a67e5ff21ae8d41702d1e30240b57e8859

  • SSDEEP

    6144:9rYTgEMnRNL+I3YHBb/vMYRbbdfHKOkECzJLaQVbU5:BBrIdU8IOklJLJbU5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe
    "C:\Users\Admin\AppData\Local\Temp\be977af4f3fd4e1fec9160d70e099198414f0d8fcdaffd0eca33d3746cfcb018.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\windows\system32\CDMP.exe.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\windows\SysWOW64\CDMP.exe
        C:\windows\system32\CDMP.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\CDMP.exe

    Filesize

    289KB

    MD5

    57cb352c1bcbb495a3415bed9d23ab5b

    SHA1

    2e01d1f0569809fb3780a13980036efb77915a2d

    SHA256

    7f0491c38b26f1c36aceba980f5e9c3765dd739d7db3505ef528f1ff5cc4106d

    SHA512

    b5d9fac474f745441039ecb2c8e4c7e3b9f61eccb89b18989b2825af56e0a64b1baa190a82bfba50ec2d99e4d8605ab3c84f7aaf31c7222fa356e8af11ef86ab

  • C:\Windows\SysWOW64\CDMP.exe.bat

    Filesize

    72B

    MD5

    ce67253baa3d1efa086304ceac13baea

    SHA1

    cddc1331dfba7d31e1176d328bb36c76461b2fa6

    SHA256

    67e0e29621efe6101a86be391248e92b5960f514b425d61a2ca60ac423333957

    SHA512

    a1891e5283d2004611911da10ea90d7b4ee10a9788595f7b7d19165f962b297988e0d8a1765397dc0762315486de8730f50b3252dbd225e179df93167a8175d9

  • memory/1716-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1716-12-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2268-18-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2268-19-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB