Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 03:22

General

  • Target

    e21ee8365e87be0ff7256db82599dd7e4b1edafa49ff9780a07377d2d9ad94aa.exe

  • Size

    395KB

  • MD5

    24ac96b09cb9256bc14dc129d39d2207

  • SHA1

    0a8c1ffddde8e3594d593c3ac373a8b767e10467

  • SHA256

    e21ee8365e87be0ff7256db82599dd7e4b1edafa49ff9780a07377d2d9ad94aa

  • SHA512

    521214e48bbc05f378dd4d9afd9fd22f309c58e607cd346119337440171b79795ce041c31b2ae8d24380a9848846baa28a7741031e6f000fec172a7eb45db650

  • SSDEEP

    6144:4jlYKRF/LReWAsUyeGzYqEMZuoWUPrtJeiNYd5lr5OzRoOWX:4jauDReW4GzYqboETeXr5B

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e21ee8365e87be0ff7256db82599dd7e4b1edafa49ff9780a07377d2d9ad94aa.exe
    "C:\Users\Admin\AppData\Local\Temp\e21ee8365e87be0ff7256db82599dd7e4b1edafa49ff9780a07377d2d9ad94aa.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\ProgramData\xyxprw.exe
      "C:\ProgramData\xyxprw.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    395KB

    MD5

    76e3e45743d31d3a6a244e4107c031bc

    SHA1

    0b0a338b6e3253c50dfd7669078f20a9006edd60

    SHA256

    810a5ef2096499bc22a12a3c75e49063aed5817f596a460b5df4fb32333f0a67

    SHA512

    56cb9d7655ba5ca238d35f7c497e3477054b9fb7baec1f98d357122a34c384769ff4692a6dcfd8ceafdf394b8f0fd8c4474317723523c8598e59f44acdf397e2

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\xyxprw.exe

    Filesize

    258KB

    MD5

    1fe367a1efd27d6841e842ac240d340a

    SHA1

    999679bf5a85e50fadc7e746319d3c088b2c8f0b

    SHA256

    6ffd8d3057f55f76d0a42d335b199332e8f92e1a9afb873de02773c6dcdc8a9a

    SHA512

    1a22439075acb76b3342b2e8ffe6ff812fb00e1b62654c66c9957800455be2af909e8114092a41d2ca8e1e9e70b0d35a398005b1ceb3f94c861c16ff1eb92ebb

  • memory/1692-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1692-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1692-9-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4808-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB