Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 03:40

General

  • Target

    db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea.exe

  • Size

    3.7MB

  • MD5

    f3a9ff1299615f57487ac216be97a8ba

  • SHA1

    ec1aebb91cb05ffff2d543c819c7873915b2caec

  • SHA256

    db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea

  • SHA512

    8ed9aef4325cc741b2c03245d5195a18147aad18dcfc9cc7fcf70e8ac9399d2de6c0b892d91f1ab5d65e399f3764f68e99bac0ca44e67610b684596bda106109

  • SSDEEP

    98304:u/kG9YUSe3fqEyNqONCGu3zui3gRr+H6AwOZzYbJrNcH52:xG9Ye3fqEyNqUQzv3gRo7zYbgZ2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea.exe
    "C:\Users\Admin\AppData\Local\Temp\db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Local\Temp\is-I84LP.tmp\db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-I84LP.tmp\db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea.tmp" /SL5="$11003A,3682303,53248,C:\Users\Admin\AppData\Local\Temp\db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea.exe"
      2⤵
      • Executes dropped EXE
      PID:1068

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-I84LP.tmp\db7c2282c4c18ffbffc070ae86c5e4501a9bc0ae987b7f9f9f1f6df78890afea.tmp

          Filesize

          669KB

          MD5

          52950ac9e2b481453082f096120e355a

          SHA1

          159c09db1abcee9114b4f792ffba255c78a6e6c3

          SHA256

          25fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd

          SHA512

          5b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba

        • memory/220-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/220-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/220-13-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1068-7-0x0000000000690000-0x0000000000691000-memory.dmp

          Filesize

          4KB

        • memory/1068-14-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/1068-17-0x0000000000690000-0x0000000000691000-memory.dmp

          Filesize

          4KB