Analysis
-
max time kernel
24s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe
Resource
win10v2004-20240508-en
General
-
Target
6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe
-
Size
501KB
-
MD5
6ff6185e0effbb81a7d09e1d2a708928
-
SHA1
e5048e767bd8119cc5d8d7658cd690466e6a9ab1
-
SHA256
6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f
-
SHA512
e4dba804d15273bde07a3ef6dafd464b0ed3b58cdcfaac15668979b38336e2eee1ccdbe413ddd5291751f704a7a927630f190fd278b5064130d19633b5ecd8f3
-
SSDEEP
6144:wlj7cMnU+c78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAF4:wlbU+285bM3npxYfj63hgD1ZiH
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 10 IoCs
Processes:
resource yara_rule behavioral2/memory/548-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX C:\Windows\MSWDM.EXE UPX behavioral2/memory/548-8-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/1912-11-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/4220-9-0x0000000000400000-0x000000000041B000-memory.dmp UPX C:\Users\Admin\AppData\Local\Temp\6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE UPX behavioral2/memory/1044-19-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/1912-25-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/1044-22-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/4220-26-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
Processes:
MSWDM.EXEMSWDM.EXE6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXEMSWDM.EXEpid process 4220 MSWDM.EXE 1912 MSWDM.EXE 4172 6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE 1044 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
MSWDM.EXE6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe -
Drops file in Windows directory 3 IoCs
Processes:
6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exeMSWDM.EXEdescription ioc process File created C:\WINDOWS\MSWDM.EXE 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe File opened for modification C:\Windows\dev57D4.tmp 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe File opened for modification C:\Windows\dev57D4.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
MSWDM.EXEpid process 1912 MSWDM.EXE 1912 MSWDM.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXEpid process 4172 6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE 4172 6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE 4172 6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exeMSWDM.EXEdescription pid process target process PID 548 wrote to memory of 4220 548 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe MSWDM.EXE PID 548 wrote to memory of 4220 548 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe MSWDM.EXE PID 548 wrote to memory of 4220 548 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe MSWDM.EXE PID 548 wrote to memory of 1912 548 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe MSWDM.EXE PID 548 wrote to memory of 1912 548 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe MSWDM.EXE PID 548 wrote to memory of 1912 548 6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe MSWDM.EXE PID 1912 wrote to memory of 4172 1912 MSWDM.EXE 6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE PID 1912 wrote to memory of 4172 1912 MSWDM.EXE 6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE PID 1912 wrote to memory of 4172 1912 MSWDM.EXE 6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE PID 1912 wrote to memory of 1044 1912 MSWDM.EXE MSWDM.EXE PID 1912 wrote to memory of 1044 1912 MSWDM.EXE MSWDM.EXE PID 1912 wrote to memory of 1044 1912 MSWDM.EXE MSWDM.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe"C:\Users\Admin\AppData\Local\Temp\6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:548 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4220
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev57D4.tmp!C:\Users\Admin\AppData\Local\Temp\6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4172
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev57D4.tmp!C:\Users\Admin\AppData\Local\Temp\6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE
Filesize501KB
MD5f5e7919311da886ac48e7686c8b7ffb8
SHA1396be44cee14aad7e8326a9fc0753558413f41ee
SHA256096739d07d558cf52308b44ea8b57ef79ab2af138c7b2fd1470f8855ae17cf46
SHA51223867df998b6783b771ed71fae948c6d167e158866594b56b5ae31a1687aabcc97d645b4b73a76251f7e88e0d5da9413e60cf451f932bfa0892971fab57fa4db
-
Filesize
47KB
MD52af966e7672f1e9c626245551247fb3a
SHA1e951cfe9ab27dad1f3df6e8189d0cf9b6dbbf66c
SHA2566b493904f292ff29033f7c6570485a7bef4d83eb9a71b2e64b9fc3308017a6c8
SHA512dfa2ae6cf2ff64bb9e3f884c02d348a9e615e94e6cbd05ce8bc98ec98d22dead2b6007e7da9e1d9e2317d53366c58611100146a68ff44526e93ea71d2561c98e
-
Filesize
453KB
MD596f7cb9f7481a279bd4bc0681a3b993e
SHA1deaedb5becc6c0bd263d7cf81e0909b912a1afd4
SHA256d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290
SHA512694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149