Analysis

  • max time kernel
    146s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 05:33

General

  • Target

    674a338a72aeb79df6b94fc847444df22fff800cfaa5cefd64a3aa58cae6c7cf.exe

  • Size

    9.2MB

  • MD5

    d8f37867de99e4975fcbe9b8fc0d9ba4

  • SHA1

    7bf53547f01ee2b9250407bb64f5b090d24bc190

  • SHA256

    674a338a72aeb79df6b94fc847444df22fff800cfaa5cefd64a3aa58cae6c7cf

  • SHA512

    51e52d5176a16eea070311df322644d96cce04f69dd05c64328a307d6423957eea4c33f2010f962e3a35300a607c09cffd91e79da2fb45083c25ea05162b94e9

  • SSDEEP

    196608:JYe4Ffq7631UhiCM5DKQ8KKls8yXFHlKqol0m7JTjhO3ewo+m4XiGPh:JYtNaUCsvcyX1lcl0shO3y+ms

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\674a338a72aeb79df6b94fc847444df22fff800cfaa5cefd64a3aa58cae6c7cf.exe
    "C:\Users\Admin\AppData\Local\Temp\674a338a72aeb79df6b94fc847444df22fff800cfaa5cefd64a3aa58cae6c7cf.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3304
    • C:\Users\Admin\AppData\Local\Temp\674a338a72aeb79df6b94fc847444df22fff800cfaa5cefd64a3aa58cae6c7cf.exe
      "C:\Users\Admin\AppData\Local\Temp\674a338a72aeb79df6b94fc847444df22fff800cfaa5cefd64a3aa58cae6c7cf.exe"
      2⤵
      • Checks BIOS information in registry
      • Enumerates connected drives
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:2616
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4200,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4036 /prefetch:8
    1⤵
      PID:2260

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2616-10-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-21-0x0000000000400000-0x0000000000CB9000-memory.dmp

            Filesize

            8.7MB

          • memory/2616-29-0x0000000000401000-0x0000000000F6A000-memory.dmp

            Filesize

            11.4MB

          • memory/2616-28-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-7-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-26-0x0000000000400000-0x0000000000CB9000-memory.dmp

            Filesize

            8.7MB

          • memory/2616-25-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-13-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-22-0x0000000000400000-0x0000000000CB9000-memory.dmp

            Filesize

            8.7MB

          • memory/2616-18-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-19-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-20-0x0000000000401000-0x0000000000F6A000-memory.dmp

            Filesize

            11.4MB

          • memory/2616-12-0x00000000001D0000-0x00000000001D1000-memory.dmp

            Filesize

            4KB

          • memory/2616-17-0x0000000000F70000-0x0000000001210000-memory.dmp

            Filesize

            2.6MB

          • memory/2616-11-0x0000000000400000-0x0000000000CB9000-memory.dmp

            Filesize

            8.7MB

          • memory/3304-1-0x0000000001230000-0x0000000001233000-memory.dmp

            Filesize

            12KB

          • memory/3304-0-0x0000000000400000-0x0000000000F6B000-memory.dmp

            Filesize

            11.4MB

          • memory/3304-16-0x0000000000400000-0x0000000000F6B000-memory.dmp

            Filesize

            11.4MB

          • memory/3304-9-0x0000000010000000-0x00000000108DD000-memory.dmp

            Filesize

            8.9MB

          • memory/3304-14-0x0000000010000000-0x00000000108DD000-memory.dmp

            Filesize

            8.9MB

          • memory/3304-2-0x0000000010000000-0x00000000108DD000-memory.dmp

            Filesize

            8.9MB

          • memory/3304-4-0x0000000010000000-0x00000000108DD000-memory.dmp

            Filesize

            8.9MB