Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 11:15

General

  • Target

    FIVEMEXTERNAL.exe

  • Size

    38.8MB

  • MD5

    2afc219d8885c4c185eee4f6c8004e0f

  • SHA1

    5574b00a3f2fab89efcb9aad94ccff3029cff817

  • SHA256

    9ddf5b5eabcec1b0e1d5f5f4d5f26ba60af2e0cbfc98cb9f2f550b3f5efc02e9

  • SHA512

    36baf115ae1e92f427d7f787b34580a2d45bb33758e9a69142c051ff6969b1cee9eec5b08225a413b2ec2d8c3c3190062364f48c99bd34e127f1949c8d329325

  • SSDEEP

    786432:zEeCwvmCGas4CtOIF0QnI8VhuLOQGj+UR0KVqeg/LUMXWNs1NrjO0tdZ4EP:QeCuHI9nIghDQBgpVqegxWNCNrjOQyE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FIVEMEXTERNAL.exe
    "C:\Users\Admin\AppData\Local\Temp\FIVEMEXTERNAL.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Users\Admin\AppData\Local\Temp\onefile_2404_133696629196900000\Stub.exe
      "C:\Users\Admin\AppData\Local\Temp\FIVEMEXTERNAL.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_2404_133696629196900000\python310.dll

    Filesize

    4.3MB

    MD5

    e4533934b37e688106beac6c5919281e

    SHA1

    ada39f10ef0bbdcf05822f4260e43d53367b0017

    SHA256

    2bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5

    SHA512

    fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9