Resubmissions

18-07-2024 07:25

240718-h84wjs1hpb 10

18-07-2024 07:19

240718-h51pqa1gng 10

17-07-2024 20:55

240717-zqkhmaydmq 10

17-07-2024 19:21

240717-x2pwdaycjb 10

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-07-2024 20:55

General

  • Target

    a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe

  • Size

    703KB

  • MD5

    43478841baa4b8754f75516220e33ac3

  • SHA1

    2585a613129d7e3dbff3eb16b10ce3fe940c99a3

  • SHA256

    a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc

  • SHA512

    9441209433e2d3d49012431011048cd33a7ce980482658a0b1e2ccd3baa70524d2585901b6130d4644d7ca0139d881a9f11a933949ed39ad805a147694b37f87

  • SSDEEP

    12288:C6JZ+UD5+1fpL2ikTgmPb2EdVu/BdmSHqDd6bhW2RJV7uikFg:JEUD52fpL2bgmSEds/BnKQPlubg

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe
    "C:\Users\Admin\AppData\Local\Temp\a9053a3a52113698143a2b9801509c68d0d8b4b8208da453f0974547df0931bc.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1828-0-0x00007FFD07925000-0x00007FFD07926000-memory.dmp

    Filesize

    4KB

  • memory/1828-1-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-2-0x000000001C490000-0x000000001C95E000-memory.dmp

    Filesize

    4.8MB

  • memory/1828-3-0x000000001BE90000-0x000000001BF2C000-memory.dmp

    Filesize

    624KB

  • memory/1828-4-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-5-0x000000001C960000-0x000000001C9C2000-memory.dmp

    Filesize

    392KB

  • memory/1828-6-0x00000000017C0000-0x00000000017C8000-memory.dmp

    Filesize

    32KB

  • memory/1828-7-0x000000001CEE0000-0x000000001CF32000-memory.dmp

    Filesize

    328KB

  • memory/1828-10-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-11-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-16-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-18-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-19-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-20-0x00007FFD07925000-0x00007FFD07926000-memory.dmp

    Filesize

    4KB

  • memory/1828-21-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-22-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-23-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-24-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB

  • memory/1828-25-0x00007FFD07670000-0x00007FFD08011000-memory.dmp

    Filesize

    9.6MB