Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe
Resource
win10v2004-20240709-en
General
-
Target
19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe
-
Size
410KB
-
MD5
8703197432133dba5a6d0ee778c45ca8
-
SHA1
7176c0ec07390e09d256b35b52869c6bb45c68d3
-
SHA256
19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d
-
SHA512
abc694c672bd48abace6d4325fc61c3d2077fe98054f0a5ecd2ff3ea1339e7dc96adb9ec008ec18a947542b48dbeaaf9fb8e706fb607ee6df696719d2cd84523
-
SSDEEP
12288:CxIK9V14ImyHYCmU6gKHwY0Pw6RurQ8U0m:CJEyY1U6gJ8Lm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1716 cpwse.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\cpwse.exe" cpwse.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1716 3224 19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe 86 PID 3224 wrote to memory of 1716 3224 19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe 86 PID 3224 wrote to memory of 1716 3224 19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe"C:\Users\Admin\AppData\Local\Temp\19424e1c0e51976ada348a1e40d28246561acdf0f551f77def99053aee5b695d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\ProgramData\cpwse.exe"C:\ProgramData\cpwse.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
410KB
MD56ca969ae26b987de0f01ef1309cc4005
SHA1e2cc1c72e12a5987ea0f8fb3b6cdd6af06f017f8
SHA256c78b26fa1711e33ab08e4b2ca8e8b65e185f7ac7d5d71176880a20d77a5a7057
SHA512f4e94b455b86b967b1f831624101ae5a4b938c4e2b497234a39704237206f09b82cb23686a7aa9fd9791040410996867695a60a1dd5f0a5d7ae4e0dfef50fec9
-
Filesize
150KB
MD5aef10b9ba25f907727558514f2dfbab0
SHA1d67383ef1b23d4da72339d66de9541c2e1efaf53
SHA256f5e77ddc706f6dffe056dc2f8a88adece36e0e4552bc70a85f36b1e01fe547ad
SHA5125e607a70ca3fa489897f8df0c96570709839364cd8cabd5f76386dfff01ca2986d50c120cf82926dff950c7d7b6ec833ea7558b64ec8f0dfe2e5070abf1da103
-
Filesize
259KB
MD5d150801cd624d7c993b01530041171b1
SHA17b4f6165500a19c1455dd0ccbdc9fd94e52737a7
SHA256fdbfd6eecd57fac5ed5296c35c3e26b82f36e41fa3e0feda1d6a7c01b553747f
SHA512cd9d8b755399d3d2d93120bcb56be8edc713c16fe7fc9774ef75bc78b0ed34732423abbb0b81503a3681f969fb47807f7ba405c74481f4b4feb4be11c0333a4c