Analysis

  • max time kernel
    22s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 09:38

General

  • Target

    eac781cfd613b3d0cfad7e35123c525dcc73b07bb718df196a2f44cdf94997fb.exe

  • Size

    2.2MB

  • MD5

    d8d929c28e990ee53f77560cc5d2e899

  • SHA1

    57e04b4a3daeb8ecb80dd309f97630fcc5f5e6bc

  • SHA256

    eac781cfd613b3d0cfad7e35123c525dcc73b07bb718df196a2f44cdf94997fb

  • SHA512

    ffc386a78267dff5df469a7ee095651dbafbc9dd032b89653ac94f9bb17c00cc29e6bc8d970dd16f04fa94ce1f030db54e85961679777da075e6e36f27a9a5d7

  • SSDEEP

    49152:WbV+QCbRquA/m2yL5zbfFiV+XenmE3/z2:WbV+5oq2VjnmV

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 10 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eac781cfd613b3d0cfad7e35123c525dcc73b07bb718df196a2f44cdf94997fb.exe
    "C:\Users\Admin\AppData\Local\Temp\eac781cfd613b3d0cfad7e35123c525dcc73b07bb718df196a2f44cdf94997fb.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2216
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev1F24.tmp!C:\Users\Admin\AppData\Local\Temp\eac781cfd613b3d0cfad7e35123c525dcc73b07bb718df196a2f44cdf94997fb.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\AppData\Local\Temp\EAC781CFD613B3D0CFAD7E35123C525DCC73B07BB718DF196A2F44CDF94997FB.EXE
        3⤵
        • Executes dropped EXE
        PID:2644
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev1F24.tmp!C:\Users\Admin\AppData\Local\Temp\EAC781CFD613B3D0CFAD7E35123C525DCC73B07BB718DF196A2F44CDF94997FB.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EAC781CFD613B3D0CFAD7E35123C525DCC73B07BB718DF196A2F44CDF94997FB.EXE

    Filesize

    2.2MB

    MD5

    c0e2f7a343d9e67bc8106eb37db447cb

    SHA1

    fc018bc786eb4233c6866294df7351821a82dad1

    SHA256

    252b39ed75b690bd906ba3b71c932b7ab1963a3f14bb62b2568153d2b741ddb8

    SHA512

    cc89f3b214f662e8861d67cf3476f699458ff38d108a75ce2817f1bce4d01cb6ed789634f1b90f3e5f778e16f628baa9aa90a7d0680e9a962334e67ea40a0466

  • C:\Users\Admin\AppData\Local\Temp\eac781cfd613b3d0cfad7e35123c525dcc73b07bb718df196a2f44cdf94997fb.exe

    Filesize

    2.1MB

    MD5

    b8d69fa2755c3ab1f12f8866a8e2a4f7

    SHA1

    8e3cdfb20e158c2906323ba0094a18c7dd2aaf2d

    SHA256

    7e0976036431640ae1d9f1c0b52bcea5dd37ef86cd3f5304dc8a96459d9483cd

    SHA512

    5acac46068b331216978500f67a7fa5257bc5b05133fab6d88280b670ae4885ef2d5d1f531169b66bf1952e082f56b1ad2bc3901479b740f96c53ea405adda18

  • C:\Windows\MSWDM.EXE

    Filesize

    80KB

    MD5

    501f727fd29030d1af7937cf02748bf1

    SHA1

    db54ea740e13b5b7c5eae0c46ba35ee24bb63f26

    SHA256

    8a2d9932962112f5140a01e9bd386ea41a62fd198ee15bab09441d230a2d505f

    SHA512

    32bc9f567399b102e5230a4c4b2e4e1fe3fdb8273effb385119092d6e9961b47918336b69dfb725c9bc6e7ad2bdfdd4fc9e9492351be696bc43a721fb750de0e

  • memory/2216-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2216-37-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2420-7-0x0000000000250000-0x000000000026B000-memory.dmp

    Filesize

    108KB

  • memory/2420-11-0x0000000000250000-0x000000000026B000-memory.dmp

    Filesize

    108KB

  • memory/2420-16-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2420-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2668-32-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2668-27-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2820-18-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2820-35-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB