Analysis

  • max time kernel
    19s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 20:48

General

  • Target

    387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe

  • Size

    383KB

  • MD5

    8c8992742e0b8da2566e20cbf47daca0

  • SHA1

    1536a36b17ba21d071f9192f7e20463d14a744b8

  • SHA256

    387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51

  • SHA512

    1a8d076512ce8775b57559bdc47b359b9f1f12fa60ac1b1ae21aa36b8afb78c5c0d852ee96878daa0e6b7623baae82c60d95ad150213569c08f53aad4c6b7939

  • SSDEEP

    6144:wlj7cMnb+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCY:wlbb+8U66b5zhVymA/XSRhB

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 9 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
    "C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2820
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev140D.tmp!C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE
        3⤵
        • Executes dropped EXE
        PID:2644
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev140D.tmp!C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE!
        3⤵
        • Executes dropped EXE
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    e232e754f601471d0aebcb1a45529cc9

    SHA1

    8371dd957e9d81df57ceacd6235e77a15e511659

    SHA256

    2f9a865d6d559a837567f5234e5491cdbf0eefa186b9452e36414c5acd18085b

    SHA512

    fb9898459d2814b446ba7edd03566d6c4ff411f75854cc5d18f0f5f186a3c45a2bebc78d8b4a886bb0b3a9b917182a0aeeb64b3112eb1ec7b52bef8ea2a9ddc5

  • \Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe

    Filesize

    335KB

    MD5

    40ac62c087648ccc2c58dae066d34c98

    SHA1

    0e87efb6ddfe59e534ea9e829cad35be8563e5f7

    SHA256

    482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916

    SHA512

    0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

  • memory/1736-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1736-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2528-21-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2528-30-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2528-24-0x0000000000250000-0x000000000026B000-memory.dmp

    Filesize

    108KB

  • memory/2656-27-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2656-25-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2820-14-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2820-31-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB