Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe
Resource
win10v2004-20240611-en
General
-
Target
4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe
-
Size
6.1MB
-
MD5
99792d3b5b3cf3aac818900460220c6a
-
SHA1
60207b54f1dda926b209980cc1b6b51dbfcc3831
-
SHA256
4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0
-
SHA512
dc7dc6be143fc076ee04130330f7d23a52dc5f860e21959a39352044f035163fe90396bd8f1d91522b3beae7483796b923d619d498ab83beab49a79371f9950a
-
SSDEEP
196608:5qKoY1P36Iydc1IAxHbG6rjYoybRhDwA2I:APu6IzeANC6PYoyTB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3576 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe -
Executes dropped EXE 1 IoCs
pid Process 3576 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe -
resource yara_rule behavioral2/memory/4220-2-0x0000000002540000-0x000000000254B000-memory.dmp upx behavioral2/memory/3576-15-0x0000000002630000-0x000000000263B000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\V: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\H: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\K: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\M: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\Q: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\O: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\P: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\S: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\T: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\I: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\J: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\L: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\N: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\W: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\Y: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\G: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\X: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\Z: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\A: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\B: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\E: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe File opened (read-only) \??\U: 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 3576 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 3576 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 3576 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 3576 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 3576 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3576 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 92 PID 4220 wrote to memory of 3576 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 92 PID 4220 wrote to memory of 3576 4220 4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe"C:\Users\Admin\AppData\Local\Temp\4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe"1⤵
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Ê¢ÊÀ·ÉÑï\4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exeC:\Ê¢ÊÀ·ÉÑï\4f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12B
MD5b0752b7cccf669f541c9d04a4a07b2fc
SHA1dd33d51d19085e3243a7c5a74ee9e9631fae41b0
SHA2566c39533dc9c18495cb7549f2d49710c43bc3e98bf9111527464baa9a36f01ead
SHA5127d6aecf045fedfe2219f9e091d367141faaa373025ca1d7bc0b1ac72d7cde787610f6af337db8e27fe194f9ae2a3a9f2bd9d3845ecff2b224ffc2b1b806cf79a
-
Filesize
102B
MD54931f0c3010d28f52847321580605176
SHA10379aa06ba0eb3bc2e03d5640b49a945cc3f24f0
SHA2563b8afee3a7fe7c5be8c52f2c1f74b5349386ed8526cdacf051cf62250d5cd904
SHA5127c02ae8d4cd7eb8eb8e516a894c67d9aafb05424b01a4ac236299188988e9e1e822509625b6749bb1bbf6d18fd92e1ebcec47ecd5369a6e1acf58510f7ef6df0
-
Filesize
6.1MB
MD599792d3b5b3cf3aac818900460220c6a
SHA160207b54f1dda926b209980cc1b6b51dbfcc3831
SHA2564f31afc042acc25485bf1d2511e41e2f8dd9f5649e4b908b948a7280799c7af0
SHA512dc7dc6be143fc076ee04130330f7d23a52dc5f860e21959a39352044f035163fe90396bd8f1d91522b3beae7483796b923d619d498ab83beab49a79371f9950a