Analysis

  • max time kernel
    117s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-07-2024 02:37

General

  • Target

    3be2f73e86582b17df09eb72d94e2a90N.exe

  • Size

    932KB

  • MD5

    3be2f73e86582b17df09eb72d94e2a90

  • SHA1

    5b5fbe55e9ca0b194d61c77049685920cc2532c5

  • SHA256

    d58f4f306f1c64374f063d9ea11c16d75208c6c32bc6b0f0877e2bec01f3f939

  • SHA512

    551a95e711b46ec4aea2451a11bf188d96ffe6423f27c7327f6d3e4d1f234c80600211ffc126e15d73eef338129300f7012e06195c9fb708c0dae44dea55e76c

  • SSDEEP

    12288:71/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdXZRwUTg2mhv:71/aGLDCM4D8ayGMZo8/7b82mdSM+sOe

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3be2f73e86582b17df09eb72d94e2a90N.exe
    "C:\Users\Admin\AppData\Local\Temp\3be2f73e86582b17df09eb72d94e2a90N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\ProgramData\pqpcg.exe
      "C:\ProgramData\pqpcg.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\DDF.sys .exe

    Filesize

    932KB

    MD5

    7ef85091608f0a943af742e92c431e78

    SHA1

    e9349eed6aa3e3bf1d0a40335f68533ce17a5e62

    SHA256

    505a959a15fb5347ffec378c2d35905ea196df94d22169ee48d0ecc35c746690

    SHA512

    9b32f2ef280febf128d853714bc13abcc9c2fef56f8a359e2eda158574708146544451c670df6f13c1ebd35373f2c622155b0cd7b8800e206b7428108217af53

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    71e38cb8371fa644436922e0eee6040d

    SHA1

    6e9e897cb95fd8434891e87a584f5f1b9482cae2

    SHA256

    2c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4

    SHA512

    852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be

  • C:\ProgramData\pqpcg.exe

    Filesize

    454KB

    MD5

    f36e72af8af31abd7f76e1144089af6b

    SHA1

    0e753f0fd424d48c5e9d4e6f9e4a6c90142af7a2

    SHA256

    86cfccdd7e937ad4138365919730ed69a1d5e413f4c71625b9b8c9f89e6a7bcf

    SHA512

    0fda38d751a6c68a533a8f65cfe352709fdf5a5fe2621bcd311102980678b895433afd2ff6e6a71a1f68b63d816119713d51c766921deb976190185d4fe272c8

  • memory/736-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/736-9-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4856-132-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB