Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 18:05

General

  • Target

    ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe

  • Size

    402KB

  • MD5

    216bb057c08279fd5e6f1d63ebcfc870

  • SHA1

    65b6ae32dde078ab2e3a97ee3a6215b18a707b51

  • SHA256

    ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84e

  • SHA512

    0fde16ee45267052f532cf543687a7d1cc7c2ccdaa41f7b5afcf9008129afb69559c03cb23105722e87ae25f3b2394706c9d6e1fde4836e0cea1d5fe386be17a

  • SSDEEP

    12288:4FiHUV3jIBLFlLHFP7rHkunuWPGX9CcEjm:4FiOjwFlzFP3TYQm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe
    "C:\Users\Admin\AppData\Local\Temp\ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\DomaIQ.exe
      C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\DomaIQ.exe /path="C:\Users\Admin\AppData\Local\Temp\ae28322e0824f19bdab5fd824142a22ea5f4a27d8f695a2ce0bf6b642b55f84eN.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:5004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\DomaIQ.exe

          Filesize

          211KB

          MD5

          27d5e5a09fa180c3238ed33bc7cf993b

          SHA1

          355f72845fcf414001808a8491e8dee3b8863cfb

          SHA256

          235602a88f5602010bc33f5b05671bfad3e2599d96273fc2c361357507ad08bc

          SHA512

          036a7620212f83663ae0c7498501fdba1609bf68488b735ac30fd986ed6c9017c132d562798e9bbcc911945601ea17d64e00020331ba2ef68cd5251ec40ad04b

        • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\config.dll

          Filesize

          32B

          MD5

          99c24b9b5ff8e799f63a5cd83c45f22f

          SHA1

          27309942f049f86aa35abfe02e5aeb4b98092546

          SHA256

          121e0fe7dfcf0b30a94f69e5ce1fe6cacaae06eef5d8c0c1b4d1dbc053bacf74

          SHA512

          03700daca72551bb16253c731a7ece05128871baa45b36112b5d46c441e377cb2b26ed6e8f5d549abdf4cd3bb5d8d284ee65ea3ae25cefa1efb477f7a769f387

        • C:\Users\Admin\AppData\Local\Temp\DM2\DownQuick_018\routes.dll

          Filesize

          253B

          MD5

          0e89961cb0d97179cb73d72aae331b97

          SHA1

          337e2e5ce46ca83847dc7306ff39b7c38ae98997

          SHA256

          bdf9007a6d27ca4c9e28ea947c9eae58d53fd14a3a8d85615a7b471fbcd3ed51

          SHA512

          78f59688e38a771e2994feb449296a2a25abb2bb74c2ebf97d4c18ff252eeb01ada28c021aa8867bf746e1e5a56c51243508137e4bfb5d358b3fb61ba623e2bc

        • memory/5004-8-0x00007FFB495A3000-0x00007FFB495A5000-memory.dmp

          Filesize

          8KB

        • memory/5004-9-0x0000000000660000-0x000000000069A000-memory.dmp

          Filesize

          232KB

        • memory/5004-10-0x00007FFB495A0000-0x00007FFB4A061000-memory.dmp

          Filesize

          10.8MB

        • memory/5004-11-0x00007FFB495A0000-0x00007FFB4A061000-memory.dmp

          Filesize

          10.8MB

        • memory/5004-12-0x00007FFB495A0000-0x00007FFB4A061000-memory.dmp

          Filesize

          10.8MB

        • memory/5004-13-0x00007FFB495A0000-0x00007FFB4A061000-memory.dmp

          Filesize

          10.8MB

        • memory/5004-18-0x00007FFB495A0000-0x00007FFB4A061000-memory.dmp

          Filesize

          10.8MB