Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe
Resource
win10v2004-20240412-en
General
-
Target
feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe
-
Size
396KB
-
MD5
bc56307535a8ae2beef1ce986071c2ce
-
SHA1
420d7e69676bbf93b3cf23dc3e9b659b5f06271b
-
SHA256
feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3
-
SHA512
004c5ceeb372ee80bb9ca6b7a1a3729ba60209d1fc3112579cc7100b3151b03ffbb8f7a0eb30cbacb9164e5cac892746bf1ae1d006f5995511f24f5ca318e573
-
SSDEEP
6144:4jlYKRF/LReWAsUyVgWM7806lewXk9FoTnFZvYBbdkizuqROWhki64l24r1EfP:4jauDReWTGA06kwnz4YqR9hk1jco
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1176 awfxs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\awfxs.exe" awfxs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1176 2604 feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe 84 PID 2604 wrote to memory of 1176 2604 feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe 84 PID 2604 wrote to memory of 1176 2604 feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe"C:\Users\Admin\AppData\Local\Temp\feda2ac13bd94240c90ed7a5e8a08f4464d00c2ca182914e71fb0e1b71415ec3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\ProgramData\awfxs.exe"C:\ProgramData\awfxs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD503229702a2ce4776848382488b27b758
SHA1841da4aa07b24a0d3b62b55b62d64ff551e9bee1
SHA2563e92a35241de0e411ef676377b19e5f688cf4476d889ffa6ff90d4aec66e71a1
SHA512f5b307bea4efbd39d8c09c1243cc8614d5c6821f86315867333c0a04bbb9170444793f0da44a8dcc636e001a29dbb8d1da04192554849f06e6fb261d4a42489f
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
259KB
MD5a0a1e1d997941c22fca28269583223d7
SHA14aeaf35ca280c4dbb6f1e7d903b8e2fec6209d7e
SHA256762cee8bf614bd5ab3af8d1b72b34a4c99de93e621c314d4da910f94cd7850bd
SHA51249889366efa403bae5a5a40ef0c57ca34749cd88403110ac8522e21d6b1eeed8a5f4308d6bbd8ca5fb23f491311558a59a0db7b12e89fcf783f1bea9b0f1a1e6