Analysis

  • max time kernel
    132s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 14:49

General

  • Target

    ee8f394d9e192c453d47a0c57261a03921dcbb97248a67427cb6fc6d8833c8a0.exe

  • Size

    28KB

  • MD5

    dd6d09e0e565ea18b85a18af8e95eb75

  • SHA1

    5b1b9593baa56dbe43e9bbbeda576727697e7101

  • SHA256

    ee8f394d9e192c453d47a0c57261a03921dcbb97248a67427cb6fc6d8833c8a0

  • SHA512

    54e787e49c8d7008cdef0822136bd93854aa8b7dcfa7fa844f7ce7e44177c65daa0c6679f3596d3fecb24b615e9867ef16201571e4f00f331b4e546c81c703b4

  • SSDEEP

    768:WKATpdDhsNNNCcJhC1SE4q1AG6Eaqi6s:U3t1aq1AEaqPs

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee8f394d9e192c453d47a0c57261a03921dcbb97248a67427cb6fc6d8833c8a0.exe
    "C:\Users\Admin\AppData\Local\Temp\ee8f394d9e192c453d47a0c57261a03921dcbb97248a67427cb6fc6d8833c8a0.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Windows\System32\systeminfo.exe
      "C:\Windows\System32\systeminfo.exe"
      2⤵
      • Gathers system information
      PID:4224
    • C:\Windows\System32\ipconfig.exe
      "C:\Windows\System32\ipconfig.exe" /all
      2⤵
      • Gathers network information
      PID:1348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4292-0-0x0000000000560000-0x000000000056E000-memory.dmp

          Filesize

          56KB

        • memory/4292-1-0x00007FFD6C170000-0x00007FFD6CC31000-memory.dmp

          Filesize

          10.8MB

        • memory/4292-2-0x000000001B110000-0x000000001B120000-memory.dmp

          Filesize

          64KB

        • memory/4292-3-0x00007FFD6C170000-0x00007FFD6CC31000-memory.dmp

          Filesize

          10.8MB

        • memory/4292-4-0x000000001B110000-0x000000001B120000-memory.dmp

          Filesize

          64KB