Analysis

  • max time kernel
    157s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 01:09

General

  • Target

    a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe

  • Size

    480KB

  • MD5

    0e8e2d4b749d4393e69c7bb41d6b4bd9

  • SHA1

    707963d461396225e0e7c150dce14938c6be3c24

  • SHA256

    a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1

  • SHA512

    1e674f48442f1de3b0f053acd9a19eb2d3fcfb892d393315d9a96f654edb7533789f92bcd6cdd404212485c4e4cbd44c35a0155f734b8909430eab4918eba77a

  • SSDEEP

    12288:4jauDReWGJVdiObOUCfAcJFg3ThL+NqQlcHNzZP0HK9:4DDKJdKf8/Qlctz50HK9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe
    "C:\Users\Admin\AppData\Local\Temp\a19279088fd9461881c3c101fdda9317852acf537e6281b24e3ac9cd4bd8aee1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\ProgramData\hptmc.exe
      "C:\ProgramData\hptmc.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\DumpStack.log.tmp .exe

    Filesize

    480KB

    MD5

    b401b96074137cded6fc03a23949cfdb

    SHA1

    fc36bb74e8d4426bb34b03d585a95be9b328741e

    SHA256

    a9b8e4788da2edec7ca846b6a1fbfdb6f4bdcd7d96859a6a49304ee92e91b303

    SHA512

    803d0f23b0b3e70f94623eed8769cdbed798a886f5d6a454fddb4cf61f0817baf32ac22b943cb0d3d32d39a881122e4d7fd7f8eaa036417ced4652fc67d7e49e

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\hptmc.exe

    Filesize

    343KB

    MD5

    f02ef839331e5413b5317c876fc5131d

    SHA1

    a8053b8bdc16008b73cf0e57b6af04862274b684

    SHA256

    2c8dbd22f4ffc1a554182d1d7240958c79e981145e85719631543c403092dfc6

    SHA512

    e373438b08a39f06100919b8dbe3035e0e72a82bb5af431c3bfc8cfbb64d30e652eb3ecf072e44d3b0a5508449751078d2beb7ce79139bdeb87b3bb3a9ff63ee

  • memory/2604-100-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4292-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4292-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4292-9-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB