Analysis

  • max time kernel
    92s
  • max time network
    93s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-11-2024 10:15

General

  • Target

    NeverLoseByOxy.exe

  • Size

    5.7MB

  • MD5

    24f6e0f1cd42246f176a505f8d7d1c4d

  • SHA1

    5160c3f78672b86970135261941e2ad003d44ba1

  • SHA256

    b5cce9b75d7d336fc8d3ebe678af0a9b25ade673964c86a5527df736fdd3ec84

  • SHA512

    77b48b6652526f4d8a571eaaf539181385c8b3ada0e974caf5c4949fa289c46694bab0e8b0e91048d76be87fe0003ea98bc605f560792df7fefde1465ab7da85

  • SSDEEP

    98304:whhqDOlIP2BtJIx4hpebqKbhAUDdROejIAV/PCqa5oRJ0XkKPdKH10msJ:whhqaIMg6wqKbyUDdROCIAV/PCkIkKFn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NeverLoseByOxy.exe
    "C:\Users\Admin\AppData\Local\Temp\NeverLoseByOxy.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\LN.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\LN.exe"
      2⤵
      • Executes dropped EXE
      PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\LN.exe

    Filesize

    5.1MB

    MD5

    05d7d9a925f13945bbc1a724da0158e8

    SHA1

    60514a63bd200e29783b5e867f305033de74ac55

    SHA256

    a6c2cefa5d79f3893bd35d7bde504390f7062e5e2db4e537a0d83085505ccf25

    SHA512

    033117f6ab66536e1b2f8fab9beaa003c347b539f5977c3cf85bb1f64d8e8a5a80e32e6ff95dc42564567f8c94dbb197853b648700627eeb7fcd13346979d415