Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 04:46

General

  • Target

    af1aa3d91de1a1a4ac3f88dee61bae13f3d54423b9dada978f309f496f688bdf.exe

  • Size

    5KB

  • MD5

    62a27d07ba987f6e8706427ca3810859

  • SHA1

    6f688e986809f59baeac65f8f593eced2467e4f9

  • SHA256

    af1aa3d91de1a1a4ac3f88dee61bae13f3d54423b9dada978f309f496f688bdf

  • SHA512

    9c704683160fb8c267169cdd0b106c274c37eb0ffe0b67f08ec2cb09065030a990dbbe1a70e86d2e2521529ebfe4ed689a78ed62023bb6b1c6c77378a884a735

  • SSDEEP

    96:9uKB7r0gHNw0iNw9vJKXbUp8wAnQWRRU1xXHZqYYB:kKhDt6N0KQWRREHZqtB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af1aa3d91de1a1a4ac3f88dee61bae13f3d54423b9dada978f309f496f688bdf.exe
    "C:\Users\Admin\AppData\Local\Temp\af1aa3d91de1a1a4ac3f88dee61bae13f3d54423b9dada978f309f496f688bdf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\srris.exe
      "C:\Users\Admin\AppData\Local\Temp\srris.exe"
      2⤵
      • Executes dropped EXE
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\srris.exe

    Filesize

    5KB

    MD5

    480d56bb58082397033f29418269d8b4

    SHA1

    f30cdab10f382a34b780bf43b41b04ca2583bcda

    SHA256

    498b9818b1c3794a8b0cb3b832f2fce51b91c17d22756cfebcb500409638f2ab

    SHA512

    e823deec548f9ef126be4639fd50b675a5096c9591d6d03dddaf0f6cf6e95ce8dfafd0dd9fe0c7873b773cc47441a314b58a8f2deb1b39708823982093e32dbd