Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 18:46

General

  • Target

    10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe

  • Size

    82KB

  • MD5

    0fe1da6400dd50e389be159cfc62a143

  • SHA1

    abcc8e403af44dc8e64b394d89cfbc9efd05a3d6

  • SHA256

    10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7

  • SHA512

    dc910ef25f8341fbfc880195e5b4dc08cbbc39d59a7ff0b486751653dfcf06ac37fab74f7dfcccf9f996d04ba54a136933365f6d9fd5400c249266cf14979a40

  • SSDEEP

    768:eFq/4qn0F1raGCI3FfeMLT++G31LSadk344524444/M5zy6wSQte9SOVmhf9Ezp:qk4e0VCI33T++C1uaeN6ytQteVmhFEN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe
    "C:\Users\Admin\AppData\Local\Temp\10f53ca82e1e1f5900a825f9983e04be0c1293ed1b5b9b3c7a828f72c1a19ec7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\edurss.exe
      "C:\Users\Admin\AppData\Local\Temp\edurss.exe"
      2⤵
      • Executes dropped EXE
      PID:2348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\edurss.exe

          Filesize

          82KB

          MD5

          a5cbde71e6ce20b3eeff474e0eb75f02

          SHA1

          681eb987043a52612f92f7a45c50f9bf751f02bd

          SHA256

          07fe5822066ed6a1fa299df845e709652c10c7b58e35a62fac8bb2479b8c9320

          SHA512

          7bc93a1a17af1e878cf3e4bc63e1684b343116f165c9d5c9cdd77ab4d3a71035722659ceb51aa203624e9c1fa2643de5b12c9a760be03a5648f5cbe1443a4b79

        • memory/2952-3-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/2952-0-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB

        • memory/2952-1-0x0000000004000000-0x0000000004005000-memory.dmp

          Filesize

          20KB