Analysis

  • max time kernel
    90s
  • max time network
    95s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-04-2024 04:51

General

  • Target

    cff5657843fe7039f6e15fbfdb8728b1b752d66503d0564dbe5b3bb4c567a529.exe

  • Size

    6.1MB

  • MD5

    ff48ea9f90dadf5201438b1e9de131b9

  • SHA1

    0adcbf8ef9f00875d10f4851fb8a2c23def7d1a4

  • SHA256

    cff5657843fe7039f6e15fbfdb8728b1b752d66503d0564dbe5b3bb4c567a529

  • SHA512

    1b4ac86e1315d8fe471aaa33eef9cac4809d48e1b949c1d6adb268b4b75038f8b716faa95575f9c89d98172259d09bad2cc3a85ae709e02d2ea9449b9cfe7d22

  • SSDEEP

    98304:YNw/Xb1EVZoSip8lfNLtiyIaHgEPUD1J9IxAwST07NqWifSpO16eKMi+tt3HkDMi:NQgp8FvFHz491SsYQ6r5+tt3BWH9RzKo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cff5657843fe7039f6e15fbfdb8728b1b752d66503d0564dbe5b3bb4c567a529.exe
    "C:\Users\Admin\AppData\Local\Temp\cff5657843fe7039f6e15fbfdb8728b1b752d66503d0564dbe5b3bb4c567a529.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
        work.exe -priverdD
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4376
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\festh.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\festh.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:4984

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat
    Filesize

    35B

    MD5

    ff59d999beb970447667695ce3273f75

    SHA1

    316fa09f467ba90ac34a054daf2e92e6e2854ff8

    SHA256

    065d2b17ad499587dc9de7ee9ecda4938b45da1df388bc72e6627dff220f64d2

    SHA512

    d5ac72cb065a3cd3cb118a69a2f356314eeed24dcb4880751e1a3683895e66cedc62607967e29f77a0c27adf1c9fe0efd86e804f693f0a63a5b51b0bf0056b5d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\work.exe
    Filesize

    5.8MB

    MD5

    9eecde1399cc9081d8e2c3b228ce34ea

    SHA1

    7951e70bd9231d7a88cd2b9ed151ef9c936da11f

    SHA256

    3095b5364a984068acd8d54e6d4740db378750160657e50705bdba5be66f35c6

    SHA512

    cd1ebfa6e8a8d4ac03f8b89bc56e7abd8caaa54c813c1da8aebcdb5443b9d95c651ab26580994bf3c05b90a99bc07b56aeeb2d070456adefd64edd26919d31dd

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\festh.exe
    Filesize

    5.5MB

    MD5

    9e5880b7c48bb2b7532b0a1b68ef8747

    SHA1

    1cc4383ea2879b960edc6516e682d21f42fceef7

    SHA256

    195669b35daa53ca30d9b9bf7e93eaef8f48c610abfd039e74e015d50a3034af

    SHA512

    a62c2797aaf4215ab648266ee37b690304f66bb947b46eb7c98f1b47956aee589a2bbe8ab89c9a4984b8be4ac7bb6ffa1440c9e32251e15bea5d2f87f4e134df

  • memory/4984-19-0x0000000000C30000-0x0000000000C31000-memory.dmp
    Filesize

    4KB

  • memory/4984-20-0x0000000000D40000-0x000000000163C000-memory.dmp
    Filesize

    9.0MB

  • memory/4984-21-0x0000000000D40000-0x000000000163C000-memory.dmp
    Filesize

    9.0MB

  • memory/4984-23-0x0000000000D40000-0x000000000163C000-memory.dmp
    Filesize

    9.0MB