Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-09-2024 09:08

General

  • Target

    flower_cracked.exe

  • Size

    2.0MB

  • MD5

    a9e8452e49bc005c900efcfd44a61827

  • SHA1

    23a8648c67cae5c7b585e7799f28fde92f0b13e6

  • SHA256

    21427e770ace36295c64388b491f757a4bb540c8dc4c78a534a8db21bd96b59f

  • SHA512

    5fbf8257d17c8ea2343cf35c20bf66b38aa62f344be295076b4355a4c49770c4ad0f28f47d047cc91d715848ac96fd5281254d6923b8d3f7d5cd921a7d2f4f0b

  • SSDEEP

    12288:aV9WSZOSjCaQSeI2ELUwcnC/dOxVzR+H/3n7Z6kpnvrMDOyfu2K:T2QS1LlJdOx5RC/IkpnvgS2u2K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\flower_cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\flower_cracked.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c cls
      2⤵
        PID:4272
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c color E
        2⤵
          PID:3888
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\flower_cracked.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1412
          • C:\Windows\system32\certutil.exe
            certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\flower_cracked.exe" MD5
            3⤵
              PID:680
            • C:\Windows\system32\find.exe
              find /i /v "md5"
              3⤵
                PID:5052
              • C:\Windows\system32\find.exe
                find /i /v "certutil"
                3⤵
                  PID:1480
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c cls
                2⤵
                  PID:4204
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c C:\Windows\System32\strnmap.exe C:\Windows\System32\driver.sys
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3288
                  • C:\Windows\System32\strnmap.exe
                    C:\Windows\System32\strnmap.exe C:\Windows\System32\driver.sys
                    3⤵
                    • Executes dropped EXE
                    PID:2024
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c cls
                  2⤵
                    PID:4944
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c color E
                    2⤵
                      PID:2888

                  Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Windows\System32\strnmap.exe

                    Filesize

                    530KB

                    MD5

                    54ed683eba9340abf6783bd8d7b39445

                    SHA1

                    950e3c11c71354097c8440529b31f8ac2b3c32a8

                    SHA256

                    2d0a9d5ca563ffa82a974903bb43411b22c863311ec926449f08d16f483e4e70

                    SHA512

                    9ff8c110823bad1e0a79a810b151e1d5557022080af0c8aaa9ff76996bd040747346f62459c50468cf86f49389c0e5fb7f057e9bd30fa31fed49ae5692d50ae2

                  • memory/2024-7-0x00007FF6508A0000-0x00007FF650951000-memory.dmp

                    Filesize

                    708KB

                  • memory/2024-5-0x00007FF6508A0000-0x00007FF650951000-memory.dmp

                    Filesize

                    708KB