Analysis
-
max time kernel
22s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
Resource
win10v2004-20240508-en
General
-
Target
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
-
Size
383KB
-
MD5
8c8992742e0b8da2566e20cbf47daca0
-
SHA1
1536a36b17ba21d071f9192f7e20463d14a744b8
-
SHA256
387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51
-
SHA512
1a8d076512ce8775b57559bdc47b359b9f1f12fa60ac1b1ae21aa36b8afb78c5c0d852ee96878daa0e6b7623baae82c60d95ad150213569c08f53aad4c6b7939
-
SSDEEP
6144:wlj7cMnb+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCY:wlbb+8U66b5zhVymA/XSRhB
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 8 IoCs
resource yara_rule behavioral2/memory/1724-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/files/0x000700000002328e-5.dat UPX behavioral2/memory/2804-11-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/1724-8-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/files/0x0007000000023412-16.dat UPX behavioral2/memory/3832-20-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/2804-23-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral2/memory/4244-24-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 4244 MSWDM.EXE 2804 MSWDM.EXE 636 387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE 3832 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe File opened for modification C:\Windows\dev8A2F.tmp 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe File opened for modification C:\Windows\dev8A2F.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 MSWDM.EXE 2804 MSWDM.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4244 1724 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 83 PID 1724 wrote to memory of 4244 1724 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 83 PID 1724 wrote to memory of 4244 1724 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 83 PID 1724 wrote to memory of 2804 1724 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 84 PID 1724 wrote to memory of 2804 1724 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 84 PID 1724 wrote to memory of 2804 1724 387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe 84 PID 2804 wrote to memory of 636 2804 MSWDM.EXE 85 PID 2804 wrote to memory of 636 2804 MSWDM.EXE 85 PID 2804 wrote to memory of 3832 2804 MSWDM.EXE 86 PID 2804 wrote to memory of 3832 2804 MSWDM.EXE 86 PID 2804 wrote to memory of 3832 2804 MSWDM.EXE 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe"C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4244
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev8A2F.tmp!C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe! !2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE
- Executes dropped EXE
PID:636
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev8A2F.tmp!C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE
Filesize383KB
MD533ceb3cb245cbb62cb8b95bf940049b8
SHA1311f8e1df109dc6dcd3188053641671da880d46c
SHA25667360a841497f74596dd311002a9dbc94f972ef7106cfe29306a2290841adbf1
SHA512b5cc2f0e10e50ce4b6b05ce4f1eb2208c6f4bb041e493ce69ffd07b618ffe22bd0240f7e8c479e58be5f3c24ef8ae09202a8276856160db3d0752aa937dbfe68
-
Filesize
47KB
MD5e232e754f601471d0aebcb1a45529cc9
SHA18371dd957e9d81df57ceacd6235e77a15e511659
SHA2562f9a865d6d559a837567f5234e5491cdbf0eefa186b9452e36414c5acd18085b
SHA512fb9898459d2814b446ba7edd03566d6c4ff411f75854cc5d18f0f5f186a3c45a2bebc78d8b4a886bb0b3a9b917182a0aeeb64b3112eb1ec7b52bef8ea2a9ddc5
-
Filesize
335KB
MD540ac62c087648ccc2c58dae066d34c98
SHA10e87efb6ddfe59e534ea9e829cad35be8563e5f7
SHA256482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916
SHA5120c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f