Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 16:55

General

  • Target

    Andromeda‌‌‌ BY @STRANGEMALWARE.exe

  • Size

    11.7MB

  • MD5

    2d74c0773274a5a26452a58597b71dae

  • SHA1

    eb55c987262efad46d4ee1368c947d82defcb0b5

  • SHA256

    151869c507cc328addc531df01b4b659d929df630e719267d2f52397a4d914c0

  • SHA512

    0c0758fe0667bc62bbb09e8a34345cd4605e1c9e938c7aeb6e92583fd4616bf092898ce41e61184d5f8d055e6eede42e6803be21a4e1b077462d0d4c4339f4ba

  • SSDEEP

    196608:WzIuGN2e2/PEIr9dpoKjT+uwVkSWO2t0c+gWzs634rS0gQfx+vD7clrfj1Y:WFA2JnjrpoKjTB+HWORcxWQVrSkAgl/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Andromeda‌‌‌ BY @STRANGEMALWARE.exe
    "C:\Users\Admin\AppData\Local\Temp\Andromeda‌‌‌ BY @STRANGEMALWARE.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\Andromeda.exe
      "C:\Users\Admin\AppData\Local\Temp\Andromeda.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2716 -s 720
        3⤵
          PID:2604

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Andromeda.exe

      Filesize

      17.0MB

      MD5

      d19bf0e88eee53cd54800477fbe91963

      SHA1

      3f701c190c220d804eb5c7cbd39e74c3100c5774

      SHA256

      70bfdbe3723e37ba0797e936a5d8c17ff3df7da64a4a84e6ac2f5270c37db2db

      SHA512

      87975d5a36504a356fdb04f4bb8fe7e78344e886ca68de1c482a2d6424976fba60418d6e0457b5ca6efa7c4788d583a1f4f365152f70260946a39a6319ea2f2c

    • memory/2248-0-0x000007FEF6243000-0x000007FEF6244000-memory.dmp

      Filesize

      4KB

    • memory/2248-1-0x0000000000B10000-0x00000000016D2000-memory.dmp

      Filesize

      11.8MB

    • memory/2248-2-0x000007FEF6240000-0x000007FEF6C2C000-memory.dmp

      Filesize

      9.9MB

    • memory/2248-10-0x000007FEF6240000-0x000007FEF6C2C000-memory.dmp

      Filesize

      9.9MB

    • memory/2716-9-0x000007FEF6240000-0x000007FEF6C2C000-memory.dmp

      Filesize

      9.9MB

    • memory/2716-11-0x0000000000A00000-0x0000000001AF8000-memory.dmp

      Filesize

      17.0MB

    • memory/2716-12-0x000007FEF6240000-0x000007FEF6C2C000-memory.dmp

      Filesize

      9.9MB