Analysis

  • max time kernel
    359s
  • max time network
    360s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 13:08

General

  • Target

    4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe

  • Size

    71KB

  • MD5

    7d09bbc0aee91d29b3e62aa7889d75ac

  • SHA1

    dcc48feec76915615fca1db6e2e726543fba9566

  • SHA256

    4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9

  • SHA512

    3f476f40f9a17919946df05bca46d0169531fd32982cc7c62ec685aef680c2fe064361da928fb174274c88f25b64db75f9c996e271e5b3a0836aa4101649a275

  • SSDEEP

    192:YKA9x8uHsLXl0Hjo7WLom8YHwOrDU0U4cbHaF55n3nN7a:YKA9WuwXl0YZm8eDr40/cuF73Za

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe
    "C:\Users\Admin\AppData\Local\Temp\4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
      dw20.exe -x -s 1144
      2⤵
        PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2284-0-0x000007FEF553E000-0x000007FEF553F000-memory.dmp

      Filesize

      4KB

    • memory/2284-1-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

      Filesize

      9.6MB

    • memory/2284-2-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

      Filesize

      9.6MB

    • memory/2284-7-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

      Filesize

      9.6MB

    • memory/2608-6-0x0000000000460000-0x0000000000461000-memory.dmp

      Filesize

      4KB