Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 11:49

General

  • Target

    e19880b4ed3babf34b581f9958019b9c.exe

  • Size

    408KB

  • MD5

    e19880b4ed3babf34b581f9958019b9c

  • SHA1

    560aea3c82754e3543c8d513090c96631594de11

  • SHA256

    2a471b97ddb0c6d855494b688ddee4f3398eca2dccc7b54d8578318f7d770da5

  • SHA512

    eb826eddb594a9a24a7299b8596cf83e6a9cf712b055d25722b196c3b9ecfa0381de37d30c861ec0e3db22a825492ff88eb417c8c0a0e9d40799881ec02352cd

  • SSDEEP

    6144:WZMkgViyFcN2K533wr1S01+X1hi5xKd8PZrzTGUteH2mZJzTIXFoCPcAC:rVi7X338w01Yni+GPlzTB0Hb+FoZx

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e19880b4ed3babf34b581f9958019b9c.exe
    "C:\Users\Admin\AppData\Local\Temp\e19880b4ed3babf34b581f9958019b9c.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /u /s "msengine.dll"
      2⤵
        PID:2032

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1452-0-0x0000000000400000-0x0000000000562000-memory.dmp

            Filesize

            1.4MB

          • memory/1452-1-0x0000000000570000-0x0000000000573000-memory.dmp

            Filesize

            12KB

          • memory/1452-2-0x0000000002320000-0x0000000002321000-memory.dmp

            Filesize

            4KB

          • memory/1452-3-0x0000000000400000-0x0000000000562000-memory.dmp

            Filesize

            1.4MB

          • memory/1452-4-0x0000000000570000-0x0000000000573000-memory.dmp

            Filesize

            12KB