Analysis

  • max time kernel
    44s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/06/2024, 20:43

General

  • Target

    2d999916a0fc6039b4204b14a094bdf26331789769fb26a832c586121f43ade1.exe

  • Size

    538KB

  • MD5

    a18c6319c4f67bd331a2eba61903f165

  • SHA1

    df9a4a01237ef4dab334819c714fd5d6b2275567

  • SHA256

    2d999916a0fc6039b4204b14a094bdf26331789769fb26a832c586121f43ade1

  • SHA512

    dd38d03c02d6498ce135010ac5f554d6d8b7d65aa1a5aedc83bf1ab45e5cd48f3f96743b3262c219a20c64a0ba2dc3dbd7385b74b2563e5efffdc5c8519ae0bb

  • SSDEEP

    12288:wlbC+h1gL5pRTcAkS/3hzN8qE43fm78Vl:WbC+w5jcAkSYqyEl

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d999916a0fc6039b4204b14a094bdf26331789769fb26a832c586121f43ade1.exe
    "C:\Users\Admin\AppData\Local\Temp\2d999916a0fc6039b4204b14a094bdf26331789769fb26a832c586121f43ade1.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3368
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devF09A.tmp!C:\Users\Admin\AppData\Local\Temp\2d999916a0fc6039b4204b14a094bdf26331789769fb26a832c586121f43ade1.exe! !
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Users\Admin\AppData\Local\Temp\2D999916A0FC6039B4204B14A094BDF26331789769FB26A832C586121F43ADE1.EXE
        3⤵
        • Executes dropped EXE
        PID:1672
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devF09A.tmp!C:\Users\Admin\AppData\Local\Temp\2D999916A0FC6039B4204B14A094BDF26331789769FB26A832C586121F43ADE1.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        PID:2496
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4456 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2d999916a0fc6039b4204b14a094bdf26331789769fb26a832c586121f43ade1.exe

      Filesize

      538KB

      MD5

      9afa631234e49e55d5774c888cebd2ef

      SHA1

      334266774f2ea394d031a6eb9c8a2a3100098c3b

      SHA256

      4b9922cae26aa7870282469de32b26ef5f09fe78b7d50860caef3dc76c321352

      SHA512

      3f808bfd30635dbc4deb22920e6fa699e010def81b84465c442a7121f8664c9f5944ef7accda9f9276a1e0400e3a64417f05ea754f34e977802c62deab2a88e3

    • C:\Windows\MSWDM.EXE

      Filesize

      80KB

      MD5

      dd68dc1f2acb8d56535514be222da2e9

      SHA1

      f8b48112bb5bff4d77e705ce05aa0f2dcb80c904

      SHA256

      38137371838a2b2704b823ed0fb8d6bb1d9cca9fc7da334535942ab1d489eb09

      SHA512

      2ebe2ea143735b014f5fced08a95a3e64a6c54a293a818a0d39555a31ea8d940b28ce9a6937f3d4d6cd449b849d5a1e8a645603c2571260bd6996bdb050bcb8a

    • C:\Windows\devF09A.tmp

      Filesize

      458KB

      MD5

      619f7135621b50fd1900ff24aade1524

      SHA1

      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

      SHA256

      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

      SHA512

      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

    • memory/2432-0-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2432-8-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2496-19-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2916-22-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/3368-23-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB