Analysis
-
max time kernel
157s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe
Resource
win10v2004-20240226-en
General
-
Target
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe
-
Size
480KB
-
MD5
0e8e2d4b749d4393e69c7bb41d6b4bd9
-
SHA1
707963d461396225e0e7c150dce14938c6be3c24
-
SHA256
a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1
-
SHA512
1e674f48442f1de3b0f053acd9a19eb2d3fcfb892d393315d9a96f654edb7533789f92bcd6cdd404212485c4e4cbd44c35a0155f734b8909430eab4918eba77a
-
SSDEEP
12288:4jauDReWGJVdiObOUCfAcJFg3ThL+NqQlcHNzZP0HK9:4DDKJdKf8/Qlctz50HK9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2604 hptmc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\hptmc.exe" hptmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 2604 4292 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 84 PID 4292 wrote to memory of 2604 4292 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 84 PID 4292 wrote to memory of 2604 4292 a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe"C:\Users\Admin\AppData\Local\Temp\a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\ProgramData\hptmc.exe"C:\ProgramData\hptmc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
480KB
MD5b401b96074137cded6fc03a23949cfdb
SHA1fc36bb74e8d4426bb34b03d585a95be9b328741e
SHA256a9b8e4788da2edec7ca846b6a1fbfdb6f4bdcd7d96859a6a49304ee92e91b303
SHA512803d0f23b0b3e70f94623eed8769cdbed798a886f5d6a454fddb4cf61f0817baf32ac22b943cb0d3d32d39a881122e4d7fd7f8eaa036417ced4652fc67d7e49e
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
343KB
MD5f02ef839331e5413b5317c876fc5131d
SHA1a8053b8bdc16008b73cf0e57b6af04862274b684
SHA2562c8dbd22f4ffc1a554182d1d7240958c79e981145e85719631543c403092dfc6
SHA512e373438b08a39f06100919b8dbe3035e0e72a82bb5af431c3bfc8cfbb64d30e652eb3ecf072e44d3b0a5508449751078d2beb7ce79139bdeb87b3bb3a9ff63ee