Analysis

  • max time kernel
    23s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 23:33

General

  • Target

    sdcheck/SeedsChecker.exe

  • Size

    10.5MB

  • MD5

    5f7e0d25b165b9afcc3e6ca2bb135a47

  • SHA1

    72cbc2583a2dd5078a0edb83b153f38fb5ddb085

  • SHA256

    b94bb64c9f1e39f900c095b2034d3302a2a1cfeca08096ac71ecd24b5a25c61d

  • SHA512

    fd87ba28b3cd39b7938eba27d95588cacb51dd3e46c5f79282f3a2693e78387c1032b58b1186eae052a4d33680863c609588888dff46a3fb2542860eda4329fc

  • SSDEEP

    196608:BVE0qzgg7MlG6g4kpQbjHqsQLTJeriQAu8VAbC7EzpIjtoTSam0nuYaf:BV5qz7J6gKbjq1d4iFuE+CQzpI2+l0nu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe
    "C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe
      "C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1760 -s 520
        3⤵
          PID:2560
      • C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe
        "C:\Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2916
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2916 -s 92
          3⤵
          • Loads dropped DLL
          PID:2512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\sdcheck\EUgNJfrbZv.exe

      Filesize

      216KB

      MD5

      6ff8156ec6df07062b3a9f9594604a2b

      SHA1

      608adce74f2461d853aa5dc7590dec9daa948019

      SHA256

      1fddeef51fb61303fcd232c0d7bd9bb45cf9d7b6a4377d8ccb479ae562ae79be

      SHA512

      f40aae3ead07bcdcc7ddd0e4800026b0f9a6f50b6f1f1338ada10d63c05eb6ec0d33cfa507227c0ff46ba63193014d73e6eadc03edd31490ee982546ad64aada

    • \Users\Admin\AppData\Local\Temp\sdcheck\SeedsChecker (1).exe

      Filesize

      10.5MB

      MD5

      2ebfecade19e4b41e1968a8b5e49f163

      SHA1

      2e419a0dd67f1532ce71091f3623f992ce94c21c

      SHA256

      6851f7b4b2fc51091056aeca5616be222cf212196bef0af705ee73ff068d94e2

      SHA512

      0e105a0b503abb526817aa982d2b709b1cfdc044aa01fd93613a8cc3ed96b4c772474099bbd66be00af2873760adbecf940fe65228f5aa085443492bb509fa1f

    • memory/1300-0-0x000007FEF5313000-0x000007FEF5314000-memory.dmp

      Filesize

      4KB

    • memory/1300-1-0x0000000000110000-0x0000000000BA2000-memory.dmp

      Filesize

      10.6MB

    • memory/1300-4-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

      Filesize

      9.9MB

    • memory/1300-20-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

      Filesize

      9.9MB

    • memory/1760-9-0x0000000000C00000-0x0000000000C3A000-memory.dmp

      Filesize

      232KB

    • memory/1760-10-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

      Filesize

      9.9MB

    • memory/1760-22-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

      Filesize

      9.9MB