Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 15:59

General

  • Target

    HA-DiskSweeper1.0.exe

  • Size

    942KB

  • MD5

    631e7b294e57d8c3fddfade7e48c056a

  • SHA1

    39014bbca7990a4ce88e73e8d6eebe91052f44e8

  • SHA256

    0a88e0b598bf8140804fdab7b41d520c517aaf1b3972037a908bc7e1cd5f618b

  • SHA512

    f1aa2cff4aa67ec8b268ee356931bc61915bff8fc8290e104742bcaae232d91d160aca83f43f5b949fb8c29c38aaed2936ee0831952651730abfe2192a4b591b

  • SSDEEP

    24576:BI3+dqE8rzrsEb35FqZrrv9fGBENjYo6Ib7ecRYLDH5d:BZdEzZ/qZHtGmnsLNd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HA-DiskSweeper1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\HA-DiskSweeper1.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Users\Admin\AppData\Local\Temp\is-2CNBH.tmp\is-M5L5C.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-2CNBH.tmp\is-M5L5C.tmp" /SL4 $90188 "C:\Users\Admin\AppData\Local\Temp\HA-DiskSweeper1.0.exe" 648411 68608
      2⤵
      • Executes dropped EXE
      PID:1096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-2CNBH.tmp\is-M5L5C.tmp

    Filesize

    658KB

    MD5

    ce1f9a90233ce2291b53b48e71ea0671

    SHA1

    357e398ccbf2d8ba1cd9150f9d89ae72078dd6b0

    SHA256

    bc025c3536cbed6e396dced729394c70071a07561b1263e5c2279867b95752eb

    SHA512

    7487e6bf928473a92b40e8469ebbce29ee0e02c413f14dd079ba114470094fe393bce6cc530b162ee6b8237e729816e0a34ce0c4ce35ae2c40e1426eafd3696a

  • memory/1096-7-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/1096-14-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/1096-17-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/3408-0-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3408-2-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3408-13-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB