Analysis

  • max time kernel
    141s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/04/2024, 23:47

General

  • Target

    8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe

  • Size

    438KB

  • MD5

    f57619f1e4eece21c3183e445001ff4d

  • SHA1

    146055f362d9134917819949a329985318221808

  • SHA256

    8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774

  • SHA512

    e612a2482e598e185f72f5620ce9bf07b871d227fdc67a45cf2a4cfa0409c8e0b332211c220d2f39eeeb63c035092873f1a72693c71cdb998c687a55beda96ce

  • SSDEEP

    6144:WdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70NqY:s8kxNhOZElO5kkWjhD4A45lGU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 17 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe
    "C:\Users\Admin\AppData\Local\Temp\8da54dbf9ceaf59a2c1eb6a727ec2fc21fbc8b29dde6da1ed2cef9e167c16774.exe"
    1⤵
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\PerfLogs\FIR.EXE
      C:\PerfLogs\FIR.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2204

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\MUUQYH.EXE

          Filesize

          439KB

          MD5

          b6d55b13bf6d70c09a31b6fa4220f494

          SHA1

          009823191e00d82aaeb8ef695a66bb58ebb4cc58

          SHA256

          384c1d08d44412fe1cba0fc7b03ca0176839dc8486867c12937e956470dd729a

          SHA512

          7b6afa916232900a8ae0bcf0eb693c0d26b609816a963fb31d59649611f3a189fa478aaa62c1cd139a610918de2bb37dcf596447fe112f8a284cfa19b2d0e95d

        • memory/2204-29-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-31-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-38-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-24-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-25-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-26-0x00000000020B0000-0x00000000020B1000-memory.dmp

          Filesize

          4KB

        • memory/2204-27-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-37-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-22-0x00000000020B0000-0x00000000020B1000-memory.dmp

          Filesize

          4KB

        • memory/2204-32-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-30-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-33-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-34-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-35-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2204-36-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/4748-1-0x00000000021F0000-0x00000000021F1000-memory.dmp

          Filesize

          4KB

        • memory/4748-23-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB