Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 19:32

General

  • Target

    19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe

  • Size

    410KB

  • MD5

    8703197432133dba5a6d0ee778c45ca8

  • SHA1

    7176c0ec07390e09d256b35b52869c6bb45c68d3

  • SHA256

    19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d

  • SHA512

    abc694c672bd48abace6d4325fc61c3d2077fe98054f0a5ecd2ff3ea1339e7dc96adb9ec008ec18a947542b48dbeaaf9fb8e706fb607ee6df696719d2cd84523

  • SSDEEP

    12288:CxIK9V14ImyHYCmU6gKHwY0Pw6RurQ8U0m:CJEyY1U6gJ8Lm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe
    "C:\Users\Admin\AppData\Local\Temp\19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\ProgramData\cpwse.exe
      "C:\ProgramData\cpwse.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    410KB

    MD5

    6ca969ae26b987de0f01ef1309cc4005

    SHA1

    e2cc1c72e12a5987ea0f8fb3b6cdd6af06f017f8

    SHA256

    c78b26fa1711e33ab08e4b2ca8e8b65e185f7ac7d5d71176880a20d77a5a7057

    SHA512

    f4e94b455b86b967b1f831624101ae5a4b938c4e2b497234a39704237206f09b82cb23686a7aa9fd9791040410996867695a60a1dd5f0a5d7ae4e0dfef50fec9

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    150KB

    MD5

    aef10b9ba25f907727558514f2dfbab0

    SHA1

    d67383ef1b23d4da72339d66de9541c2e1efaf53

    SHA256

    f5e77ddc706f6dffe056dc2f8a88adece36e0e4552bc70a85f36b1e01fe547ad

    SHA512

    5e607a70ca3fa489897f8df0c96570709839364cd8cabd5f76386dfff01ca2986d50c120cf82926dff950c7d7b6ec833ea7558b64ec8f0dfe2e5070abf1da103

  • C:\ProgramData\cpwse.exe

    Filesize

    259KB

    MD5

    d150801cd624d7c993b01530041171b1

    SHA1

    7b4f6165500a19c1455dd0ccbdc9fd94e52737a7

    SHA256

    fdbfd6eecd57fac5ed5296c35c3e26b82f36e41fa3e0feda1d6a7c01b553747f

    SHA512

    cd9d8b755399d3d2d93120bcb56be8edc713c16fe7fc9774ef75bc78b0ed34732423abbb0b81503a3681f969fb47807f7ba405c74481f4b4feb4be11c0333a4c

  • memory/1716-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3224-0-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/3224-1-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/3224-9-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB