Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    26-06-2024 00:25

General

  • Target

    937a4b5e461ff9275d8aeeaf7d9bc00750853884b418f7ee6d948363b414fed6.exe

  • Size

    10KB

  • MD5

    5588ae3da3f0710397495b807d8aefb6

  • SHA1

    200af4a9f57faf0d49325ccf36d751bb8985a53b

  • SHA256

    937a4b5e461ff9275d8aeeaf7d9bc00750853884b418f7ee6d948363b414fed6

  • SHA512

    ca3b5a6c95b19b6fd6e72d78b7d89bd9ad4ba310f840855e959f66af5f58a33a1bf4b2a6aa4bf4a3f4bbb41caf74b58bc419cbbc4539b203fcdc829e824c4433

  • SSDEEP

    192:3L4sESV8q+2hVynlYJLLLThpBmmBVNAuwhZ9DO:3L4pS2DcxPLThxjeZD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\937a4b5e461ff9275d8aeeaf7d9bc00750853884b418f7ee6d948363b414fed6.exe
    "C:\Users\Admin\AppData\Local\Temp\937a4b5e461ff9275d8aeeaf7d9bc00750853884b418f7ee6d948363b414fed6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 436
      2⤵
        PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2440-0-0x000007FEF658E000-0x000007FEF658F000-memory.dmp

      Filesize

      4KB

    • memory/2440-1-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB

    • memory/2440-2-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB

    • memory/2440-4-0x000007FEF62D0000-0x000007FEF6C6D000-memory.dmp

      Filesize

      9.6MB

    • memory/2612-3-0x0000000000370000-0x0000000000371000-memory.dmp

      Filesize

      4KB