Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09-04-2024 19:26

General

  • Target

    3daf055a27b3d4cbee76d4ed9e8dcaaa.exe

  • Size

    40KB

  • MD5

    3daf055a27b3d4cbee76d4ed9e8dcaaa

  • SHA1

    e55df8b93dce7b753a3f8d808da70121ec50c568

  • SHA256

    e46e22e6e2ece6b0da732ae08663ce53f51fbd383e59311ba69cc64af4da0abc

  • SHA512

    70627881269e5474ceb2fbfb3cb239c9330009d6b3849de349cc10ae956f6fd90eff61218e7e097aca500477c6f078fcf603e07841aabefb9b4048fb7f73d28b

  • SSDEEP

    768:yAHt0V5dFlSSJaadF0ak6+fXNlsVNT40UG:yAHtaVS5GFHk62uMHG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3daf055a27b3d4cbee76d4ed9e8dcaaa.exe
    "C:\Users\Admin\AppData\Local\Temp\3daf055a27b3d4cbee76d4ed9e8dcaaa.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Users\Admin\AppData\Local\Temp\fireupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\fireupdater.exe"
      2⤵
      • Executes dropped EXE
      PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\fireupdater.exe

    Filesize

    41KB

    MD5

    62c8e642f6d29620afdea671063e690b

    SHA1

    7f84bddaeadd196b89a316189df4fc0af83ee45d

    SHA256

    ff6b01edca99215b6d96fc6116a251c1d286bf36688f2b673b94f80500c090ef

    SHA512

    56b8df9c43bfe2ece8988d2a855c8bd9e5e2fe14989f09fc2abee32516f3922916f46b5dda599a3d4dd7ec01a1e23b15acf43871998bf4d7c3b1bb6ae0c70ba7

  • memory/2532-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2640-8-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB