Analysis

  • max time kernel
    23s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 18:41

General

  • Target

    1075ade4297ad0fce67dddef5a12b0aaedb5c53a11997b7b5451cd26d7a594d9.exe

  • Size

    115KB

  • MD5

    8f1f37cecd02967f7a19d25d6bd91a4d

  • SHA1

    f494429215c32b1bb9793a3be8e85c62fdda9e4a

  • SHA256

    1075ade4297ad0fce67dddef5a12b0aaedb5c53a11997b7b5451cd26d7a594d9

  • SHA512

    1904e77afe2d0bd2986ae76303938b8e6aa2581f1e1dcda4515259e06990ea6a4aa4952fcfef4733706aeeb15b9973cbb713955e93be3826ea1f25b56453ea2f

  • SSDEEP

    3072:HQC/yj5JO3MnlgG+Hu54Fx4xE8GgPkXYLBDlxw:wlj7cMn3+OEXHoA2y

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 9 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1075ade4297ad0fce67dddef5a12b0aaedb5c53a11997b7b5451cd26d7a594d9.exe
    "C:\Users\Admin\AppData\Local\Temp\1075ade4297ad0fce67dddef5a12b0aaedb5c53a11997b7b5451cd26d7a594d9.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4980
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devC30.tmp!C:\Users\Admin\AppData\Local\Temp\1075ade4297ad0fce67dddef5a12b0aaedb5c53a11997b7b5451cd26d7a594d9.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Users\Admin\AppData\Local\Temp\1075ADE4297AD0FCE67DDDEF5A12B0AAEDB5C53A11997B7B5451CD26D7A594D9.EXE
        3⤵
        • Executes dropped EXE
        PID:4732
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devC30.tmp!C:\Users\Admin\AppData\Local\Temp\1075ADE4297AD0FCE67DDDEF5A12B0AAEDB5C53A11997B7B5451CD26D7A594D9.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:1524
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3772,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4016 /prefetch:8
    1⤵
      PID:4448

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1075ADE4297AD0FCE67DDDEF5A12B0AAEDB5C53A11997B7B5451CD26D7A594D9.EXE

      Filesize

      115KB

      MD5

      6e3b96c562faa5b79c0bd8b33d616be2

      SHA1

      30538d5778da7435a69ad8a6089d4b3769a58294

      SHA256

      acd5b4ef98818c6d1147199ca2ce10a5e8af447a1537aa78ec462effa9ff3a39

      SHA512

      37425ccc123934f2a01ff5f2a38fa4d5ce648ca4e0fdd9ebbbf9e10113717cb0e780c5c029d9b975eb2372e91a60715c4baded03938b139b6182198befbb6ceb

    • C:\Windows\MSWDM.EXE

      Filesize

      80KB

      MD5

      17f839c1b36aa7df4bbd73a247689d6a

      SHA1

      b49095efb08f54a91bcfb47bf93453179707bbcb

      SHA256

      c6ddd49456130b3007242e59ea7f5dbc4ba5fd11abf9c54ad5a1d6163104305c

      SHA512

      89d0f81951735e5afa7f027d2e14144a8dfe884f85a37641962ff02326d17a03eb1f51dbf1a6154e33208d6adaf271ec64db3aa8faea3acc3604a401fe296c9b

    • C:\Windows\devC30.tmp

      Filesize

      35KB

      MD5

      19e25386a9c5cb66495e0d4be8869822

      SHA1

      a44d071ee432576f7d10917ac33fe84000c67c65

      SHA256

      d56174b1ba2af749549e8140f8e5bec2a1cb5a62f8e7163a0a400852f1d6b926

      SHA512

      2120f0a140329e3f586d4d0e81b83afb6fc4a0728baa4de7421496f4e1a5ec982edfc1e24d72a17df7108eb95e59840b7a3dc3abca9b92a95fd6869cddf5b30b

    • memory/1524-20-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2112-0-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2112-8-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2996-11-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2996-23-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4980-10-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4980-24-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB