Analysis

  • max time kernel
    24s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 00:22

General

  • Target

    6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe

  • Size

    501KB

  • MD5

    6ff6185e0effbb81a7d09e1d2a708928

  • SHA1

    e5048e767bd8119cc5d8d7658cd690466e6a9ab1

  • SHA256

    6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f

  • SHA512

    e4dba804d15273bde07a3ef6dafd464b0ed3b58cdcfaac15668979b38336e2eee1ccdbe413ddd5291751f704a7a927630f190fd278b5064130d19633b5ecd8f3

  • SSDEEP

    6144:wlj7cMnU+c78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAF4:wlbU+285bM3npxYfj63hgD1ZiH

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 10 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe
    "C:\Users\Admin\AppData\Local\Temp\6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4220
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev57D4.tmp!C:\Users\Admin\AppData\Local\Temp\6a39307cb0fdc526a7098a1e6915a160ec035f77e377b071983a2f260541f55f.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Users\Admin\AppData\Local\Temp\6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4172
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev57D4.tmp!C:\Users\Admin\AppData\Local\Temp\6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6A39307CB0FDC526A7098A1E6915A160EC035F77E377B071983A2F260541F55F.EXE

    Filesize

    501KB

    MD5

    f5e7919311da886ac48e7686c8b7ffb8

    SHA1

    396be44cee14aad7e8326a9fc0753558413f41ee

    SHA256

    096739d07d558cf52308b44ea8b57ef79ab2af138c7b2fd1470f8855ae17cf46

    SHA512

    23867df998b6783b771ed71fae948c6d167e158866594b56b5ae31a1687aabcc97d645b4b73a76251f7e88e0d5da9413e60cf451f932bfa0892971fab57fa4db

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    2af966e7672f1e9c626245551247fb3a

    SHA1

    e951cfe9ab27dad1f3df6e8189d0cf9b6dbbf66c

    SHA256

    6b493904f292ff29033f7c6570485a7bef4d83eb9a71b2e64b9fc3308017a6c8

    SHA512

    dfa2ae6cf2ff64bb9e3f884c02d348a9e615e94e6cbd05ce8bc98ec98d22dead2b6007e7da9e1d9e2317d53366c58611100146a68ff44526e93ea71d2561c98e

  • C:\Windows\dev57D4.tmp

    Filesize

    453KB

    MD5

    96f7cb9f7481a279bd4bc0681a3b993e

    SHA1

    deaedb5becc6c0bd263d7cf81e0909b912a1afd4

    SHA256

    d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290

    SHA512

    694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149

  • memory/548-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/548-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1044-19-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1044-22-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1912-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1912-25-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4220-9-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4220-26-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB