Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 20:03

General

  • Target

    105e47edac958ce90d30885d09092170N.exe

  • Size

    41KB

  • MD5

    105e47edac958ce90d30885d09092170

  • SHA1

    d34a18b1e222d1acab1584a177ad6777190df62a

  • SHA256

    c5e1d8677f89097f8cd64b57436aec439c7b6d7901606d1b2775185c7bbb6866

  • SHA512

    9609f570c7b6ae84ce39dd771e1b5e6af10ce71680ed4586d71738f62c9075a5fff312f8477ded54f220c32be3b30dd93095343f4155ddc31bdf8cf64ca2a683

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\105e47edac958ce90d30885d09092170N.exe
    "C:\Users\Admin\AppData\Local\Temp\105e47edac958ce90d30885d09092170N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\530HAD4Y\AFF3CQ3F.htm

    Filesize

    175KB

    MD5

    da2fbc7b2179585aa78ac72b1b9fe2d7

    SHA1

    7d7974faacabd090b574d6816bce4dfdd2048e50

    SHA256

    7387a24641e47d0a0e8aac47da5ad8565d22fe46a0911b70d7b32a83a4728470

    SHA512

    1171f90ce6da81c4391c290d8a5005d12b31db800016865313ece2de847fd8f63b045a521e796c27951d3498fe56ba53bab34db0a2f90ce126f6f369a39142de

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MDMHN06X\034BW7SH.htm

    Filesize

    175KB

    MD5

    7734ebe97ce7a1f19e73d9facfa2daa1

    SHA1

    dac76388cfaad31168773c1552a1f4cd252f4598

    SHA256

    5e4c2f179c73333805118053d6f1abb0a9c89ed142ee70fed7a647e3d0a1eedd

    SHA512

    eb959e0f52e6bf950677fa81a31de1185dde00f31080da1adba62b9201e4275aeff300fb3a783825fc846f72d4840417c55b3f050b57c0ad9cb138538cd9f20a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PE7M7D0W\results[1].htm

    Filesize

    1KB

    MD5

    211da0345fa466aa8dbde830c83c19f8

    SHA1

    779ece4d54a099274b2814a9780000ba49af1b81

    SHA256

    aec2ac9539d1b0cac493bbf90948eca455c6803342cc83d0a107055c1d131fd5

    SHA512

    37fd7ef6e11a1866e844439318ae813059106fbd52c24f580781d90da3f64829cf9654acac0dd0f2098081256c5dcdf35c70b2cbef6cbe3f0b91bd2d8edd22ca

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VF89GZ6O\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\tmp51A3.tmp

    Filesize

    41KB

    MD5

    9c654f3384660a18efc19df58b587ba0

    SHA1

    08e5827fa7b58597cea657fc9f45a054cf940fba

    SHA256

    4049355c073688f66c20406ce31533e5d1f5989948db70b1445f9ccc3ec990a9

    SHA512

    a90e24405e1cada761ecf6524cb756f8ae1a04dbeee3f72ff379a21822ac8e2708cc35cc64897db7ff555e533398c8d9e4c034920206fa7205e7556f1db6d856

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    160B

    MD5

    3c38f78ede207a29c6bc35fb4e7132f3

    SHA1

    5467240aaa0a778e53f5eb946554766d38733497

    SHA256

    264e7d30252c085d3cc0c6e6bad84ff575e8571d48724ee679350fc239c8f22b

    SHA512

    43856eda4bce82604dcc817139a559dfa92a1aa36725ffa718d916303049fafb4882d3bc57cc9ef9762efb327fb11b8978574b4e1d073764a6edac1facca5d87

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/452-19-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-24-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-310-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-7-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-48-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-197-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/452-14-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1832-13-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1832-196-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1832-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1832-47-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1832-309-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/1832-42-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB