Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 00:30

General

  • Target

    $PLUGINSDIR/apple-scc.exe

  • Size

    894KB

  • MD5

    9063d36084fbe906558c507409a71377

  • SHA1

    4ba56ab05ed64d5e447e93d05544680d31ff1a6b

  • SHA256

    bcdbcadc5b2b21a64a0f9caa3413745c7ed4d137d3bb0cd79526368ecc7f214d

  • SHA512

    c3c211bd4867efd66243194b3e9514a34c197e527a83e6384a88ceaa54d1547f37713fef8180c4b0fcc23f9bb81208de905525eb107b38a5619ce88aa86d2394

  • SSDEEP

    24576:M4QLWUfv+QjsSjgfrWlWWSCFgtx4/OJmn5gHv3Ry3NT2ZP0ro4kT42:M7dGEEjWV3cx4/u+gHv3m2ZL4f2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\apple-scc.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\apple-scc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\settings.ini

    Filesize

    20B

    MD5

    2ee735d83d51cadaf54afa54668330c9

    SHA1

    7c6a6421a213af6106c21b60e05b86c05662c066

    SHA256

    2ce28859e79a3236cd72465f3bea5c7ff129ee6532987d17bdfbc6be10dd91b5

    SHA512

    955d2d7cb373d6617ee916f7dd8369d53de4ce92187c3070439e20ca477a8b3db24f940ef31019ce35dec90f12239cb4b74db11af17a7c78617ffc7c801efe4e

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\settings.ini

    Filesize

    74B

    MD5

    1829fd58a6185c1a056cea7d75d1cd17

    SHA1

    d20f470e23c8474bdf9fa302a21943460a6a9ccb

    SHA256

    b3626ce9251c8b0cab401d48763c8f9395ef15c2fb4e7d0f371ca45e4f92a478

    SHA512

    9dd91c929ca2f210d54b2cf75a3ae83efd33d98fa1ab4965f8fbb1f83fd6687fed86a75b01c16d22d6b6a7a7cd1d083db71179f61138288f53fca6102db5fd59

  • memory/2172-228-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-275-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-36-0x00000000038A0000-0x00000000038A1000-memory.dmp

    Filesize

    4KB

  • memory/2172-85-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-132-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-133-0x0000000000C20000-0x0000000000C22000-memory.dmp

    Filesize

    8KB

  • memory/2172-157-0x00000000038A0000-0x00000000038A1000-memory.dmp

    Filesize

    4KB

  • memory/2172-181-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-0-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-1-0x0000000000C20000-0x0000000000C22000-memory.dmp

    Filesize

    8KB

  • memory/2172-322-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-369-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-416-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-463-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-510-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-557-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-604-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-651-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB

  • memory/2172-698-0x00000000006A0000-0x0000000000975000-memory.dmp

    Filesize

    2.8MB