Analysis

  • max time kernel
    26s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 02:19

General

  • Target

    b7d8d828cab9f9444c060af5b2a72f147edce17325abafbb6aae62c5e7ae857b.exe

  • Size

    91KB

  • MD5

    2601f6e8ef5bed215f7bba75d7d91d64

  • SHA1

    02a0c550c0d8cea51035fee1c2f6aa738a94cc7f

  • SHA256

    b7d8d828cab9f9444c060af5b2a72f147edce17325abafbb6aae62c5e7ae857b

  • SHA512

    4d5d6f6565db3ac716be7f41bc787598a28d92c81d4160cce6f1012b74c5e20b613621f0a70c887850a538966322816eed4b547c5ef20ed4880b13084ffda165

  • SSDEEP

    1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FRG+sdguxnSngBNpT/mzNnxPAxEAz0+/Sf:HQC/yj5JO3MnRG+Hu54Fx4xE8qf

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 9 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7d8d828cab9f9444c060af5b2a72f147edce17325abafbb6aae62c5e7ae857b.exe
    "C:\Users\Admin\AppData\Local\Temp\b7d8d828cab9f9444c060af5b2a72f147edce17325abafbb6aae62c5e7ae857b.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3800
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev4A38.tmp!C:\Users\Admin\AppData\Local\Temp\b7d8d828cab9f9444c060af5b2a72f147edce17325abafbb6aae62c5e7ae857b.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\B7D8D828CAB9F9444C060AF5B2A72F147EDCE17325ABAFBB6AAE62C5E7AE857B.EXE
        3⤵
        • Sets service image path in registry
        • Executes dropped EXE
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        PID:872
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev4A38.tmp!C:\Users\Admin\AppData\Local\Temp\B7D8D828CAB9F9444C060AF5B2A72F147EDCE17325ABAFBB6AAE62C5E7AE857B.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b7d8d828cab9f9444c060af5b2a72f147edce17325abafbb6aae62c5e7ae857b.exe
    Filesize

    91KB

    MD5

    536ccb971ad213b1699e9f9d0c5c2095

    SHA1

    eed66b5c68fe5e1ccfdf6e2cd546f089c901811b

    SHA256

    088fd23573c2616f47e4808a30e02489e190ec7f8d00a7ab8c544e3c04712db0

    SHA512

    f98f8b7b023bc592f55bcd3eb94cd65bacd0b55300a2861927330380b39a0e00614f8b930f359479f29aba82461066e353f640027c9d3c8c0954d3883c133c8a

  • C:\Windows\MSWDM.EXE
    Filesize

    80KB

    MD5

    c3fa6e4c285aaf0628228a83b1a4dda3

    SHA1

    709df8148cb34fbf487f221058a65050329631bd

    SHA256

    c90a8a614282f2fc61fc182742f59fc5d8c2bd2417249d27699828e525610ae3

    SHA512

    f0a6c1cfd62d74d0bd9dc3e9bda8891c98eaaad629843792c4e1b6ca592b95f7ba49ec8417d67b16b067deb68fffc50da84db6df8260c5bc643afaf2ecc99ccd

  • C:\Windows\dev4A38.tmp
    Filesize

    11KB

    MD5

    b5f8d0c67b41eb650ddf4cc59ce48cae

    SHA1

    288f7a4b88df49875f534313cb32bd974d3278dd

    SHA256

    a495a79d9640aa57b33850b0594b4477659fcb1aa754ce0f3867252a8966ba27

    SHA512

    fdaf1dc4f20893cfbd525ef27dc7f719133751df33ff17e95f9abe430f880c140e8874e8fb499e9f94fcb3505d178974e2474002afa0f7fbc8978a1e188df6d5

  • memory/872-16-0x0000000000400000-0x0000000000405000-memory.dmp
    Filesize

    20KB

  • memory/1148-21-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3192-12-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3192-25-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3800-11-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/3800-26-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/4936-0-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB

  • memory/4936-8-0x0000000000400000-0x000000000041B000-memory.dmp
    Filesize

    108KB