Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 06:13

General

  • Target

    e6516d2911fc3378903b396b1b3ec97ddd497a1e8b974b531b1f140a485d39ca.exe

  • Size

    114KB

  • MD5

    0636fd9e7c9ef4c50d4c18127c848161

  • SHA1

    cd62c961e6a537cbbe25922b5c2494da45083848

  • SHA256

    e6516d2911fc3378903b396b1b3ec97ddd497a1e8b974b531b1f140a485d39ca

  • SHA512

    b38779e6045cfd732a9d4d9f2413a105c396f37d8a6e0dfa01fdbcc01c99c886fbc6ae6e0879d5a6fbfb279376abdfc6373c67457ed6fd46621b5e7ddac5e0ff

  • SSDEEP

    3072:UNzPHk9Mpct45TTqKR4hsEaiLez7TXHVh:UhREKu04wZrVh

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6516d2911fc3378903b396b1b3ec97ddd497a1e8b974b531b1f140a485d39ca.exe
    "C:\Users\Admin\AppData\Local\Temp\e6516d2911fc3378903b396b1b3ec97ddd497a1e8b974b531b1f140a485d39ca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Users\Admin\AppData\Local\Temp\e6516d2911fc3378903b396b1b3ec97ddd497a1e8b974b531b1f140a485d39ca.exe
      "C:\Users\Admin\AppData\Local\Temp\e6516d2911fc3378903b396b1b3ec97ddd497a1e8b974b531b1f140a485d39ca.exe"
      2⤵
        PID:3528
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 908
        2⤵
        • Program crash
        PID:3200
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3280 -ip 3280
      1⤵
        PID:4800

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsj3867.tmp\System.dll
        Filesize

        11KB

        MD5

        55a26d7800446f1373056064c64c3ce8

        SHA1

        80256857e9a0a9c8897923b717f3435295a76002

        SHA256

        904fd5481d72f4e03b01a455f848dedd095d0fb17e33608e0d849f5196fb6ff8

        SHA512

        04b8ab7a85c26f188c0a06f524488d6f2ac2884bf107c860c82e94ae12c3859f825133d78338fd2b594dfc48f7dc9888ae76fee786c6252a5c77c88755128a5b