Analysis

  • max time kernel
    126s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/04/2024, 19:55

General

  • Target

    80d575bd5d519ba60f184e49f98d6d01.exe

  • Size

    46KB

  • MD5

    80d575bd5d519ba60f184e49f98d6d01

  • SHA1

    a267147aee4b4b5fc9f6a62a0a85313608294dd2

  • SHA256

    3543ba253dc970f26d89deed5f2175a0646ee365335d32d7fda97f728cee3af9

  • SHA512

    5441d55b0fe61e9acc4e9e4a1f7d2092c805ff834d7481c99a61fdba5b118b411a6339eb8c55c4115c33d55df534fdd46ed1b024efd1197842a0d96989204249

  • SSDEEP

    768:dD2oV2AJblQRNLzFrSNTVebqxjxMQhMk6Cda2gJx:dCoVXGRTuhBxj/hY3Jx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80d575bd5d519ba60f184e49f98d6d01.exe
    "C:\Users\Admin\AppData\Local\Temp\80d575bd5d519ba60f184e49f98d6d01.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\supdater.exe
      "C:\Users\Admin\AppData\Local\Temp\supdater.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\supdater.exe

    Filesize

    47KB

    MD5

    b227e9cd678bc8c00ec4eb0deae77928

    SHA1

    b8650f5e02c241c63a02e06843ff678f85cce0ca

    SHA256

    454fb371508b40660027d9d5721d670a84923d5995b60dcedc220fd6cd8a7419

    SHA512

    bb237f133f2aa14530d3fc32d34951db62c26561409ec6afdb161a9d1219a6e54f9ee8868be3496ea13fd6326f24c0f53eee86d598358e97947839635d2f1b1d

  • memory/2052-7-0x0000000000500000-0x0000000000507000-memory.dmp

    Filesize

    28KB

  • memory/2756-1-0x0000000000500000-0x0000000000507000-memory.dmp

    Filesize

    28KB