Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 06:55

General

  • Target

    762ba8da93402dc819f75d59901bf010N.exe

  • Size

    34KB

  • MD5

    762ba8da93402dc819f75d59901bf010

  • SHA1

    99db5e83906f0e1ac19ba78fc1a6998d748e89ae

  • SHA256

    84916ec9f657fd29e4311bda5fb476e2fd16fe5c69e9d9e4ce2cf644ccb277fa

  • SHA512

    5d94b90c2bc45a9acdbba62b7dfa528da079b36a34a85cbf539dfe14bd18dd116d94de46180bd86be753fb697d9a557fb831309adfdc7f0bc1c4d72f266cb2d1

  • SSDEEP

    384:6YwzAbTtITikpqIoxO6kA35c6ubEAPTCLYz+z4GJfblRiAFojdIwMDQOS:yAHt0Vu5IrM44TlhZwKQN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\762ba8da93402dc819f75d59901bf010N.exe
    "C:\Users\Admin\AppData\Local\Temp\762ba8da93402dc819f75d59901bf010N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Users\Admin\AppData\Local\Temp\fireupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\fireupdater.exe"
      2⤵
      • Executes dropped EXE
      PID:2180

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\fireupdater.exe

          Filesize

          34KB

          MD5

          e14fd2d8ac9c35fb8c886ea481261793

          SHA1

          4bd0f60321a94dad1778b8697513ccd3132c6dcf

          SHA256

          61179e33187eb56c12dd01e4007c72bd31f6fd05d2f55d7fb9c87b7c676d3e1c

          SHA512

          e2937062e9d5ca4a670b1a60543fcc9d2a7488d14da8e56a5c79801e082449ca141cd7ec10a963988272a5a3b09522f85fa74d3fbaf1ee1004c66dbe67fe5803

        • memory/1420-1-0x0000000000401000-0x0000000000403000-memory.dmp

          Filesize

          8KB

        • memory/2180-8-0x0000000000400000-0x0000000000406000-memory.dmp

          Filesize

          24KB