Analysis

  • max time kernel
    22s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 20:48

General

  • Target

    387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe

  • Size

    383KB

  • MD5

    8c8992742e0b8da2566e20cbf47daca0

  • SHA1

    1536a36b17ba21d071f9192f7e20463d14a744b8

  • SHA256

    387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51

  • SHA512

    1a8d076512ce8775b57559bdc47b359b9f1f12fa60ac1b1ae21aa36b8afb78c5c0d852ee96878daa0e6b7623baae82c60d95ad150213569c08f53aad4c6b7939

  • SSDEEP

    6144:wlj7cMnb+UzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqCY:wlbb+8U66b5zhVymA/XSRhB

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 8 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe
    "C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4244
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev8A2F.tmp!C:\Users\Admin\AppData\Local\Temp\387d3c6127dc2fe2796b4e5cda9bdd276d9af5a20ee2b387568c30832683ea51.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE
        3⤵
        • Executes dropped EXE
        PID:636
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\dev8A2F.tmp!C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\387D3C6127DC2FE2796B4E5CDA9BDD276D9AF5A20EE2B387568C30832683EA51.EXE

    Filesize

    383KB

    MD5

    33ceb3cb245cbb62cb8b95bf940049b8

    SHA1

    311f8e1df109dc6dcd3188053641671da880d46c

    SHA256

    67360a841497f74596dd311002a9dbc94f972ef7106cfe29306a2290841adbf1

    SHA512

    b5cc2f0e10e50ce4b6b05ce4f1eb2208c6f4bb041e493ce69ffd07b618ffe22bd0240f7e8c479e58be5f3c24ef8ae09202a8276856160db3d0752aa937dbfe68

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    e232e754f601471d0aebcb1a45529cc9

    SHA1

    8371dd957e9d81df57ceacd6235e77a15e511659

    SHA256

    2f9a865d6d559a837567f5234e5491cdbf0eefa186b9452e36414c5acd18085b

    SHA512

    fb9898459d2814b446ba7edd03566d6c4ff411f75854cc5d18f0f5f186a3c45a2bebc78d8b4a886bb0b3a9b917182a0aeeb64b3112eb1ec7b52bef8ea2a9ddc5

  • C:\Windows\dev8A2F.tmp

    Filesize

    335KB

    MD5

    40ac62c087648ccc2c58dae066d34c98

    SHA1

    0e87efb6ddfe59e534ea9e829cad35be8563e5f7

    SHA256

    482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916

    SHA512

    0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f

  • memory/1724-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/1724-8-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2804-11-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2804-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3832-20-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/4244-24-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB