Analysis

  • max time kernel
    15s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-04-2024 21:32

General

  • Target

    5d254ef975da48c1e669df43870f1bb34813046a737f3d0fc5c516e1af598fbc.exe

  • Size

    4.2MB

  • MD5

    6d48457863ab10ba1ceb9e35348eb6dc

  • SHA1

    3d7d6a66ca988ed07b64d0a9df17abae8df14b8b

  • SHA256

    5d254ef975da48c1e669df43870f1bb34813046a737f3d0fc5c516e1af598fbc

  • SHA512

    528ed2d7254f6c77f1d38ca3736cd0645b65945450746800c961e473b1036a85d49f4603b57f3b465f1ffb662357d6987aa0aa102069a6aafed43d7013357b79

  • SSDEEP

    49152:WbU+EgnAj9hg5nfVMsCWtvLBGi90Qq19YnETzehkiYgpgGo/vinpqWsMYhLRCfsQ:WbU+9nfVLb2CToUp8q7

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 9 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d254ef975da48c1e669df43870f1bb34813046a737f3d0fc5c516e1af598fbc.exe
    "C:\Users\Admin\AppData\Local\Temp\5d254ef975da48c1e669df43870f1bb34813046a737f3d0fc5c516e1af598fbc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2496
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev41D1.tmp!C:\Users\Admin\AppData\Local\Temp\5d254ef975da48c1e669df43870f1bb34813046a737f3d0fc5c516e1af598fbc.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\5D254EF975DA48C1E669DF43870F1BB34813046A737F3D0FC5C516E1AF598FBC.EXE
        3⤵
        • Executes dropped EXE
        PID:2608
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev41D1.tmp!C:\Users\Admin\AppData\Local\Temp\5D254EF975DA48C1E669DF43870F1BB34813046A737F3D0FC5C516E1AF598FBC.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5D254EF975DA48C1E669DF43870F1BB34813046A737F3D0FC5C516E1AF598FBC.EXE

    Filesize

    4.2MB

    MD5

    a4935c00df5c1bbadc8329d1b41976a6

    SHA1

    855784732419a0233bb9575beb862dcf9d77d45a

    SHA256

    1da94674dc0d0979097aa1e680642a263f6a377f694fced366490fd42612e9f3

    SHA512

    c0066b6004b49eb57a533d9a476559237f861e3c9e6d1b4a0dd9ff0246f7f71f6119ca2772c4a8397b5ab3d73f3afceb4477e1bfd72f75f22eea915a0abe98c7

  • C:\Windows\MSWDM.EXE

    Filesize

    4.2MB

    MD5

    8bb45a54fd2d6733b0202a2e3f552d8c

    SHA1

    221941d097670405ac51a8411ce3ab617af0a53a

    SHA256

    34402fbb455974a3456657868f67e6c0a0507d1ed160a6d0ad76e2187319f183

    SHA512

    a239c3f0fa36d0eea7aea2d64694cac2ff34e2082b9c87dc73a5547ad1d2f3ca2c187226ffa144fa2ec03fc0012d357134df8df699e08fd6922a0d0eaad338d0

  • C:\Windows\dev41D1.tmp

    Filesize

    34KB

    MD5

    83883e2f33b94d2d3194058713b10cc0

    SHA1

    d1ace2eaf9a17fcaeba570e52872569ccc1778b8

    SHA256

    6b36425c11169bb38728bf5124bd8f816f9b5cd7694389de9c05da82d7e58250

    SHA512

    6ab03f645625fb8389b85e2194740b25f700c0256e86067571afd7bdabd555d26e7ea36b73a189a7fad0a7fe43d5e117a362974641f390da52814accbf3e7892

  • memory/2496-33-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2496-18-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2600-20-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2600-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2644-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2644-37-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2872-17-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB

  • memory/2872-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2872-8-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB

  • memory/2872-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2872-35-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB