Analysis

  • max time kernel
    141s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 09:08

General

  • Target

    etbackup_trial.exe

  • Size

    5.5MB

  • MD5

    d7cf3e989525cf9531691f00fe258bb3

  • SHA1

    fc1ecf87d4b5b6fe8a73d7cad5ee928340eafeff

  • SHA256

    06eb105bfd3126056aa4152156e85b847caf01ceebdf07c3e6b7170527e0d229

  • SHA512

    610347994386faab6ec6aa1770aa6011d48dc87659cc7efb8958f852525a172d7e647c74a1b7e9cda5f3e60ce35de7b36c8d0fabf238a80bf1277e467f056a01

  • SSDEEP

    98304:iVevN+avQiZbZ2Jf7o+co3xxkpj/M+5DRq1qEaPhtQvXrDOt62+++pQEFr:XPYiZ8VkIxmj/LRqmtKrDbY+yU

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\etbackup_trial.exe
    "C:\Users\Admin\AppData\Local\Temp\etbackup_trial.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\is-5JBLG.tmp\is-7NQ84.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5JBLG.tmp\is-7NQ84.tmp" /SL4 $80248 "C:\Users\Admin\AppData\Local\Temp\etbackup_trial.exe" 5456772 52224
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-5JBLG.tmp\is-7NQ84.tmp

    Filesize

    656KB

    MD5

    4fa180886ff7c0fd86a65f760ede6318

    SHA1

    2c89c271c71531362e84ddab5d3028f0756a9281

    SHA256

    1d9026c60374b056720cdfcfa598a641cc8fbc9932590d69b4cfbc32cd09871c

    SHA512

    a278b1d36332be9f3c284c0a4716c5e130cc6e1524c03bd693769497aeed97360c74fb8466b2d0ffd474ea8fe545c6961674ea2668a0867aee270659ad0142cd

  • C:\Users\Admin\AppData\Local\Temp\is-HEC0G.tmp\installDll.dll

    Filesize

    130KB

    MD5

    b094840fe3cd05bcf4567dbb7654eba5

    SHA1

    0a61ae7bccb4faeee8dc75479369f7f901fc8ecc

    SHA256

    b5af0f24e4ab4e44fadb61a2a8f4360c83d9859dffc8f4130c2b652a806580ee

    SHA512

    6f9380f81d7a6600953990860445fb258fbed4df872c5ab45088cd98580335035cc30908ffeec1c9199afc2783da694b5e7f7a5415c5fddb65b4c4a1d7b5325e

  • memory/1828-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1828-2-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/1828-20-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3960-12-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/3960-17-0x00000000038F0000-0x0000000003917000-memory.dmp

    Filesize

    156KB

  • memory/3960-21-0x0000000000400000-0x00000000004B3000-memory.dmp

    Filesize

    716KB

  • memory/3960-22-0x00000000038F0000-0x0000000003917000-memory.dmp

    Filesize

    156KB