Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/04/2024, 21:05

General

  • Target

    cfb511bdb1acc3b2f7be5c434d1149ca8c796201f86eed8d01a137b11728bd04.exe

  • Size

    26KB

  • MD5

    214c7f84565f168e01713d04aa1df254

  • SHA1

    3787fb9dff72c4a93f2a91920fcd6cb81aa19b7b

  • SHA256

    cfb511bdb1acc3b2f7be5c434d1149ca8c796201f86eed8d01a137b11728bd04

  • SHA512

    1051fe990d2361f9a3d3072508aa8ba04d9213d69349fede8757fc9c27601fee1adc52b36cf42f0bba7965a697b4733a205d773f3cb5995a46be409ddeb64f61

  • SSDEEP

    384:GGjw95yGiZqhpTUohIo/U4nllHQCh1I6xpPsZEGp:GGGyDqhpJ+o/U4nXQQ1i6O

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfb511bdb1acc3b2f7be5c434d1149ca8c796201f86eed8d01a137b11728bd04.exe
    "C:\Users\Admin\AppData\Local\Temp\cfb511bdb1acc3b2f7be5c434d1149ca8c796201f86eed8d01a137b11728bd04.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Users\Admin\AppData\Local\Temp\fcaip.exe
      "C:\Users\Admin\AppData\Local\Temp\fcaip.exe"
      2⤵
      • Executes dropped EXE
      PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\fcaip.exe

    Filesize

    27KB

    MD5

    fb1791fa296cac5d54313e268643d45f

    SHA1

    972d01aaf3cf102d54c337a33bcf8d64489f9037

    SHA256

    bb939d88a52b01c93fe9c2042a5000a5b5b461ef91b686ccdbe3e83ba89b47a2

    SHA512

    432dac14b2b597fdc4082793f274e66b06c6aedfbe35582466aca1c52b741ae7ca610df3a2c6ef83dddd8ef4f4ad5e523a1aaaddcc6c6c076c9be476b0016fb8

  • memory/1084-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2176-8-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB