Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 04:43

General

  • Target

    542385e7c96a8fabbe5ae603c2c0aec0N.exe

  • Size

    38KB

  • MD5

    542385e7c96a8fabbe5ae603c2c0aec0

  • SHA1

    143787cd9867e12f4d98701d1e6e1425884edc77

  • SHA256

    2a3657ae667c64e7e391bfd95f8f954cc0e335a5fef61a11c827f97b3c132f69

  • SHA512

    2fab28190fcc6a7b8d16d3419bd036af00c678537b5b0cd126e31a6f26a74608f309bca875108ae89ac0ffc28bbcc5f4b729efdb136d159b8748b708c3fc5b2a

  • SSDEEP

    384:BJBcQ3oQ/jeO6Rj2cKfbKyVtGqJ06MDQW1aj15MzF794ypMqsTqwt:1cqoGjeO6RjnyjohDx1afMB794H

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\542385e7c96a8fabbe5ae603c2c0aec0N.exe
    "C:\Users\Admin\AppData\Local\Temp\542385e7c96a8fabbe5ae603c2c0aec0N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\herewin.exe
      "C:\Users\Admin\AppData\Local\Temp\herewin.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\herewin.exe

    Filesize

    38KB

    MD5

    47859b9bd0a456889467123736833235

    SHA1

    0f7f3a66f4e474ebd3966bc8d7bd5b592895a8d9

    SHA256

    771c63a528f7842d4300b0f199aa7be846889b976722325a9d4065211f3e5b57

    SHA512

    29c45b6138f2d4dfa37e0a39a3fce7ba434fb305e7286745e352eebccefffd719ed9826720882a1118f147ce23f3df86b90506176b4e303b1677d0392ace85f8

  • memory/2660-8-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2660-1-0x0000000000400000-0x0000000000406000-memory.dmp

    Filesize

    24KB

  • memory/2660-0-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2672-16-0x0000000000310000-0x0000000000316000-memory.dmp

    Filesize

    24KB