Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
3daf055a27b3d4cbee76d4ed9e8dcaaa.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3daf055a27b3d4cbee76d4ed9e8dcaaa.exe
Resource
win10v2004-20240226-en
General
-
Target
3daf055a27b3d4cbee76d4ed9e8dcaaa.exe
-
Size
40KB
-
MD5
3daf055a27b3d4cbee76d4ed9e8dcaaa
-
SHA1
e55df8b93dce7b753a3f8d808da70121ec50c568
-
SHA256
e46e22e6e2ece6b0da732ae08663ce53f51fbd383e59311ba69cc64af4da0abc
-
SHA512
70627881269e5474ceb2fbfb3cb239c9330009d6b3849de349cc10ae956f6fd90eff61218e7e097aca500477c6f078fcf603e07841aabefb9b4048fb7f73d28b
-
SSDEEP
768:yAHt0V5dFlSSJaadF0ak6+fXNlsVNT40UG:yAHtaVS5GFHk62uMHG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2640 fireupdater.exe -
Loads dropped DLL 1 IoCs
pid Process 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2640 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe 28 PID 2532 wrote to memory of 2640 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe 28 PID 2532 wrote to memory of 2640 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe 28 PID 2532 wrote to memory of 2640 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe 28 PID 2532 wrote to memory of 2640 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe 28 PID 2532 wrote to memory of 2640 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe 28 PID 2532 wrote to memory of 2640 2532 3daf055a27b3d4cbee76d4ed9e8dcaaa.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3daf055a27b3d4cbee76d4ed9e8dcaaa.exe"C:\Users\Admin\AppData\Local\Temp\3daf055a27b3d4cbee76d4ed9e8dcaaa.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\fireupdater.exe"C:\Users\Admin\AppData\Local\Temp\fireupdater.exe"2⤵
- Executes dropped EXE
PID:2640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD562c8e642f6d29620afdea671063e690b
SHA17f84bddaeadd196b89a316189df4fc0af83ee45d
SHA256ff6b01edca99215b6d96fc6116a251c1d286bf36688f2b673b94f80500c090ef
SHA51256b8df9c43bfe2ece8988d2a855c8bd9e5e2fe14989f09fc2abee32516f3922916f46b5dda599a3d4dd7ec01a1e23b15acf43871998bf4d7c3b1bb6ae0c70ba7