Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
762ba8da93402dc819f75d59901bf010N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
762ba8da93402dc819f75d59901bf010N.exe
Resource
win10v2004-20240709-en
General
-
Target
762ba8da93402dc819f75d59901bf010N.exe
-
Size
34KB
-
MD5
762ba8da93402dc819f75d59901bf010
-
SHA1
99db5e83906f0e1ac19ba78fc1a6998d748e89ae
-
SHA256
84916ec9f657fd29e4311bda5fb476e2fd16fe5c69e9d9e4ce2cf644ccb277fa
-
SHA512
5d94b90c2bc45a9acdbba62b7dfa528da079b36a34a85cbf539dfe14bd18dd116d94de46180bd86be753fb697d9a557fb831309adfdc7f0bc1c4d72f266cb2d1
-
SSDEEP
384:6YwzAbTtITikpqIoxO6kA35c6ubEAPTCLYz+z4GJfblRiAFojdIwMDQOS:yAHt0Vu5IrM44TlhZwKQN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2180 fireupdater.exe -
Loads dropped DLL 1 IoCs
pid Process 1420 762ba8da93402dc819f75d59901bf010N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2180 1420 762ba8da93402dc819f75d59901bf010N.exe 30 PID 1420 wrote to memory of 2180 1420 762ba8da93402dc819f75d59901bf010N.exe 30 PID 1420 wrote to memory of 2180 1420 762ba8da93402dc819f75d59901bf010N.exe 30 PID 1420 wrote to memory of 2180 1420 762ba8da93402dc819f75d59901bf010N.exe 30 PID 1420 wrote to memory of 2180 1420 762ba8da93402dc819f75d59901bf010N.exe 30 PID 1420 wrote to memory of 2180 1420 762ba8da93402dc819f75d59901bf010N.exe 30 PID 1420 wrote to memory of 2180 1420 762ba8da93402dc819f75d59901bf010N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\762ba8da93402dc819f75d59901bf010N.exe"C:\Users\Admin\AppData\Local\Temp\762ba8da93402dc819f75d59901bf010N.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\fireupdater.exe"C:\Users\Admin\AppData\Local\Temp\fireupdater.exe"2⤵
- Executes dropped EXE
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e14fd2d8ac9c35fb8c886ea481261793
SHA14bd0f60321a94dad1778b8697513ccd3132c6dcf
SHA25661179e33187eb56c12dd01e4007c72bd31f6fd05d2f55d7fb9c87b7c676d3e1c
SHA512e2937062e9d5ca4a670b1a60543fcc9d2a7488d14da8e56a5c79801e082449ca141cd7ec10a963988272a5a3b09522f85fa74d3fbaf1ee1004c66dbe67fe5803