Resubmissions

11/04/2024, 07:38

240411-jgeysahh8y 7

11/04/2024, 07:37

240411-jfzlsshh7z 10

11/04/2024, 07:37

240411-jfyz9shh7y 10

11/04/2024, 07:36

240411-jfqnwseg78 7

11/04/2024, 07:36

240411-jfp3cshh7t 7

07/04/2024, 09:41

240407-ln9g3sad85 7

07/04/2024, 09:41

240407-ln4a3aad82 7

07/04/2024, 09:41

240407-lnxhhsad77 7

07/04/2024, 09:41

240407-lnq1qsad73 7

Analysis

  • max time kernel
    291s
  • max time network
    297s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/04/2024, 09:41

General

  • Target

    39d11a7c0c4286ab2fa318d37cb3c3f3.exe

  • Size

    1.9MB

  • MD5

    39d11a7c0c4286ab2fa318d37cb3c3f3

  • SHA1

    c18444d8d82b628100ac6d7b33c873884be99897

  • SHA256

    48ee5e003fdd3d8c6b50ffb7931e5562ef3d04b7b411d8cf89118655da5c0e03

  • SHA512

    3b24266cfda84af111551bb35111b1816739ffb971ee9ed26f20d3463abb7e7cc7f301bd29b0fed9f68b40a2e43e8b8fbb3c3776f3ea78eb875e0327f52d5a10

  • SSDEEP

    49152:CeZz2gwNjPDGrcflSdRwwlM2oTPHUcmdfgL:hQg0iyqwwlJyLmB

Score
7/10

Malware Config

Signatures

  • UPX packed file 36 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe
    "C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe
      "C:\Users\Admin\AppData\Local\Temp\39d11a7c0c4286ab2fa318d37cb3c3f3.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdesc-consensus.tmp

    Filesize

    2.6MB

    MD5

    4d62003ad34c5d7a6f806d8849ce9e97

    SHA1

    a08a271fd0114c10f82ff161959095d89c0bf482

    SHA256

    59838a713e970480f142eaed3df312d8aa9c707a021e5ff5dbfb86baebc9698e

    SHA512

    6b8517a14dba98c1a7ca3556d383c603ac5062b0f076473c6a9f92e38c8f3d657076be299959aaae03628daef19a68e74a3d92d5dc66269b1e5ce1f83ff2a3fe

  • C:\Users\Admin\AppData\Local\Temp\4KPV6A~1\cached-microdescs.new

    Filesize

    10.4MB

    MD5

    08a6207e21f07e31dbdc4de95f64dd01

    SHA1

    3705fb57c4ac24b382b69c5c090bc2c5e607db2f

    SHA256

    a1efcf7042d779371d261fafbddc5dc1f3f9e7a60a47101508606626f1b35d83

    SHA512

    5d56c633e976381bb1609ae321fa9a68e1a7ff1870b17a1e2358de9aeb58cca033e3f9f506a8ec05cc4c44d7caf13f7e164bed11f987848c93eeaafcac98b9c1

  • memory/4764-2-0x00000000028A0000-0x0000000002A67000-memory.dmp

    Filesize

    1.8MB

  • memory/4764-3-0x0000000002A70000-0x0000000002C27000-memory.dmp

    Filesize

    1.7MB

  • memory/4776-55-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-6-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-7-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-8-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-5-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-22-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-4-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-38-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-39-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-43-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-44-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-45-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-49-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-52-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-53-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-54-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-59-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-1-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-70-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-61-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-62-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-63-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-64-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-65-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-66-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-67-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-68-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-69-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-60-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-74-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-75-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-79-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-80-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-81-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-82-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB

  • memory/4776-83-0x0000000000400000-0x0000000000848000-memory.dmp

    Filesize

    4.3MB