Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 22:23

General

  • Target

    26b48c266555e0a08fa3f9f5bcd2c52da8635a0050390f3a6ac69af9d4eefd19.exe

  • Size

    520KB

  • MD5

    968f79efa2a8c86ce8c659bd1ec87a6b

  • SHA1

    250be5e00a8f7130a84abc3d87f431b0fa4ab0a4

  • SHA256

    26b48c266555e0a08fa3f9f5bcd2c52da8635a0050390f3a6ac69af9d4eefd19

  • SHA512

    601729dfe4329ef0f67339006d2990d25c88cdaf498e967e810f90c18486c865dcefa88738a45e98d6bfe5c0e453ee342971f3212e379d07deed91d1ac7dcc50

  • SSDEEP

    12288:R4EzRBsO5HR03nKx/K8j2C/PgAI6A1sAB1:pvsO5HR0Xz8jDvAWK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26b48c266555e0a08fa3f9f5bcd2c52da8635a0050390f3a6ac69af9d4eefd19.exe
    "C:\Users\Admin\AppData\Local\Temp\26b48c266555e0a08fa3f9f5bcd2c52da8635a0050390f3a6ac69af9d4eefd19.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe

    Filesize

    520KB

    MD5

    968f79efa2a8c86ce8c659bd1ec87a6b

    SHA1

    250be5e00a8f7130a84abc3d87f431b0fa4ab0a4

    SHA256

    26b48c266555e0a08fa3f9f5bcd2c52da8635a0050390f3a6ac69af9d4eefd19

    SHA512

    601729dfe4329ef0f67339006d2990d25c88cdaf498e967e810f90c18486c865dcefa88738a45e98d6bfe5c0e453ee342971f3212e379d07deed91d1ac7dcc50

  • memory/1244-6-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2300-10-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB