Analysis
-
max time kernel
22s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 21:55
Static task
static1
Behavioral task
behavioral1
Sample
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe
Resource
win10v2004-20240508-en
General
-
Target
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe
-
Size
246KB
-
MD5
056e17de67ca2a3176adc633ada259c8
-
SHA1
819af76d74761c1d08bacd6cd42298927bb51103
-
SHA256
5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0
-
SHA512
8f078e247b46a28ca54e0059a2038310ac589965b25e692aeafb9e690d6e4bb54d15aca5d2ff2a4d1b38a0e26ca5f230867b034cf60a0967b37f129c390930a6
-
SSDEEP
6144:wlj7cMni+ZdeKzC/leySe8AIqpoHbnDns1ND9R:wlbi+Z/VyV8hEoHbI3b
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 9 IoCs
resource yara_rule behavioral2/memory/4052-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/files/0x0009000000023537-4.dat UPX behavioral2/memory/2056-12-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/220-11-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/4052-8-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/2820-20-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/files/0x000700000002353c-22.dat UPX behavioral2/memory/2056-24-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/220-25-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 220 MSWDM.EXE 2056 MSWDM.EXE 2652 5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE 2820 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe File opened for modification C:\Windows\devE975.tmp 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe File opened for modification C:\Windows\devE975.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 MSWDM.EXE 2056 MSWDM.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4052 wrote to memory of 220 4052 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 90 PID 4052 wrote to memory of 220 4052 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 90 PID 4052 wrote to memory of 220 4052 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 90 PID 4052 wrote to memory of 2056 4052 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 91 PID 4052 wrote to memory of 2056 4052 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 91 PID 4052 wrote to memory of 2056 4052 5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe 91 PID 2056 wrote to memory of 2652 2056 MSWDM.EXE 92 PID 2056 wrote to memory of 2652 2056 MSWDM.EXE 92 PID 2056 wrote to memory of 2652 2056 MSWDM.EXE 92 PID 2056 wrote to memory of 2820 2056 MSWDM.EXE 93 PID 2056 wrote to memory of 2820 2056 MSWDM.EXE 93 PID 2056 wrote to memory of 2820 2056 MSWDM.EXE 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe"C:\Users\Admin\AppData\Local\Temp\5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:220
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devE975.tmp!C:\Users\Admin\AppData\Local\Temp\5808173b038b0a33bced01932c0b7c22072011d63de0dbaa79052837b7d67ec0.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE
- Executes dropped EXE
PID:2652
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devE975.tmp!C:\Users\Admin\AppData\Local\Temp\5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2820
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4168,i,1697479186275492802,18058102846092193784,262144 --variations-seed-version --mojo-platform-channel-handle=1280 /prefetch:81⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5808173B038B0A33BCED01932C0B7C22072011D63DE0DBAA79052837B7D67EC0.EXE
Filesize246KB
MD57c8637b78c55d657e19fbeb36c5776ac
SHA1d07ca1b5d23af1cb398a75ec7ced8e6859dafd87
SHA256af1fae030989849c4323e3e34e8c9c0cfadfb4fe14d03bb68fb397d65de525cf
SHA51279e0e0463b010da0a869cd2e59280a72d7ee0a3e9745ffd1b4d1a3093cb151d5f75cf73f9ec3abd795c1c54c5c2101ebf8e38905f7d64a554e31936c488177af
-
Filesize
47KB
MD517b789e1d1c2ac8883a68e3fdf6e06b1
SHA1f04386e2facad18e7412954d63079ea4a794457b
SHA256a1bc39e4bbc1a47b5678b2eefe3611bc61dfcb2b93025f8352123cce55a3bd69
SHA51201cb25a97e31da8947669536251215c1df9b8001d774269b17b68244a5516a452e8e540d0c6ea13d58d5fe8833fa7be7007a75d51659bbdb41dc7f3c90141f81
-
Filesize
198KB
MD5e133c2d85cff4edd7fe8e8f0f8be6cdb
SHA1b8269209ebb6fe44bc50dab35f97b0ae244701b4
SHA2566c5e7d9c81a409e67c143cd3aed33bddc3967fa4c9ab3b98560b7d3bf57d093d
SHA512701b7d1c7e154519d77043f7de09d60c1ff76c95f820fc1c9afca19724efb0847d646686053354156fd4e8a9dab1f29a79d3223f939a3ff1b3613770dc8603b1