Analysis
-
max time kernel
24s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 02:51
Behavioral task
behavioral1
Sample
ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe
Resource
win10v2004-20240508-en
General
-
Target
ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe
-
Size
75KB
-
MD5
23ab6f6bf3f969ab8b8182e3ba7a582f
-
SHA1
5597554b0f067355545ee61de44d2dc68003b9e7
-
SHA256
ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f
-
SHA512
db910852d9dc2702ed24402e37a4a0e3379b64ff5f68b8a8ef95509c4741b589a1ac8fdd2ec9bc7f0c44d6b4a4f9cd68e39d54bf855dc27245377b6425b47fd8
-
SSDEEP
1536:rxG0+a0V7JCaTYnSGMX/6riw+d9bHrkT5gUHz7FxtB:rlIV7JCaMnSrP6rBkfkT5xHzb
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral2/memory/232-0-0x0000000000400000-0x0000000000418000-memory.dmp UPX behavioral2/files/0x0008000000022f51-3.dat UPX behavioral2/memory/232-8-0x0000000000400000-0x0000000000418000-memory.dmp UPX behavioral2/memory/2400-18-0x0000000000400000-0x0000000000418000-memory.dmp UPX behavioral2/files/0x0007000000023421-17.dat UPX behavioral2/memory/4572-22-0x0000000000400000-0x0000000000418000-memory.dmp UPX behavioral2/memory/3120-23-0x0000000000400000-0x0000000000418000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 3120 MSWDM.EXE 4572 MSWDM.EXE 4880 CE5753E39168DCBC491E86F26F293579C42B7B6004B9B491E4F5AAC8DAA0111F.EXE 2400 MSWDM.EXE -
resource yara_rule behavioral2/memory/232-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/files/0x0008000000022f51-3.dat upx behavioral2/memory/232-8-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2400-18-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/files/0x0007000000023421-17.dat upx behavioral2/memory/4572-22-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3120-23-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe File opened for modification C:\Windows\dev515C.tmp ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe File opened for modification C:\Windows\dev515C.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4572 MSWDM.EXE 4572 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 232 wrote to memory of 3120 232 ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe 83 PID 232 wrote to memory of 3120 232 ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe 83 PID 232 wrote to memory of 3120 232 ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe 83 PID 232 wrote to memory of 4572 232 ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe 84 PID 232 wrote to memory of 4572 232 ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe 84 PID 232 wrote to memory of 4572 232 ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe 84 PID 4572 wrote to memory of 4880 4572 MSWDM.EXE 85 PID 4572 wrote to memory of 4880 4572 MSWDM.EXE 85 PID 4572 wrote to memory of 2400 4572 MSWDM.EXE 86 PID 4572 wrote to memory of 2400 4572 MSWDM.EXE 86 PID 4572 wrote to memory of 2400 4572 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe"C:\Users\Admin\AppData\Local\Temp\ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:232 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3120
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev515C.tmp!C:\Users\Admin\AppData\Local\Temp\ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\CE5753E39168DCBC491E86F26F293579C42B7B6004B9B491E4F5AAC8DAA0111F.EXE
- Executes dropped EXE
PID:4880
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev515C.tmp!C:\Users\Admin\AppData\Local\Temp\CE5753E39168DCBC491E86F26F293579C42B7B6004B9B491E4F5AAC8DAA0111F.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ce5753e39168dcbc491e86f26f293579c42b7b6004b9b491e4f5aac8daa0111f.exe
Filesize75KB
MD5b85403ec0ebf441dca30474eb5dc65ed
SHA19ae779ef09dade5f0167fcf674e2add095252a95
SHA256ff71ffaf2014ec77071ad2fb4fedc45ae81687c080ddcaace245fdb3327d10e0
SHA51208fac5bf9cbb78ae7d58c59a5e06a61eb866f97ac6e21a694ea7d60857ae1e42e0db0098110f15d708d95f56a977958a0c4448a74fb0ce5da9891fc8004deb5c
-
Filesize
39KB
MD5446f667d5ed0edf5ee1b0942d4cb915d
SHA1f127585abc5e64a15ff1ec7d48a839815f4e4b8e
SHA256679d9c3d8c6eee6c1d355f81b6978869acc6f2278c00d57be1dd24a929fa1a09
SHA51208b3f6c07120dff1572102f7f55d2d240c1f4ae0f3dc6f512eac73e4629bed1e8ffa1775eb24dc2cc17a36f983b4b58055a56cef417236251956675048121d68
-
Filesize
36KB
MD59f498971cbe636662f3d210747d619e1
SHA144b8e2732fa1e2f204fc70eaa1cb406616250085
SHA2568adf6748981c3e7b62f5dbca992be6675574fffbce7673743f2d7fe787d56a41
SHA512b73083c2f7b028d2946cb8f7b4fe2289fedaa4175364a2aac37db0aeff4602aede772ccc9eba7e6dcfcb7276e52604ca45d8021952201b5834485b48bca3dc93