Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2024 15:59

General

  • Target

    HA-DiskSweeper1.0.exe

  • Size

    942KB

  • MD5

    631e7b294e57d8c3fddfade7e48c056a

  • SHA1

    39014bbca7990a4ce88e73e8d6eebe91052f44e8

  • SHA256

    0a88e0b598bf8140804fdab7b41d520c517aaf1b3972037a908bc7e1cd5f618b

  • SHA512

    f1aa2cff4aa67ec8b268ee356931bc61915bff8fc8290e104742bcaae232d91d160aca83f43f5b949fb8c29c38aaed2936ee0831952651730abfe2192a4b591b

  • SSDEEP

    24576:BI3+dqE8rzrsEb35FqZrrv9fGBENjYo6Ib7ecRYLDH5d:BZdEzZ/qZHtGmnsLNd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HA-DiskSweeper1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\HA-DiskSweeper1.0.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\is-GRQEJ.tmp\is-SRCMF.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-GRQEJ.tmp\is-SRCMF.tmp" /SL4 $40148 "C:\Users\Admin\AppData\Local\Temp\HA-DiskSweeper1.0.exe" 648411 68608
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-ECEM0.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-GRQEJ.tmp\is-SRCMF.tmp

    Filesize

    658KB

    MD5

    ce1f9a90233ce2291b53b48e71ea0671

    SHA1

    357e398ccbf2d8ba1cd9150f9d89ae72078dd6b0

    SHA256

    bc025c3536cbed6e396dced729394c70071a07561b1263e5c2279867b95752eb

    SHA512

    7487e6bf928473a92b40e8469ebbce29ee0e02c413f14dd079ba114470094fe393bce6cc530b162ee6b8237e729816e0a34ce0c4ce35ae2c40e1426eafd3696a

  • memory/1808-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1808-2-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/1808-16-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/2368-17-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB