Analysis

  • max time kernel
    4s
  • max time network
    5s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2024 20:04

General

  • Target

    SHARPIL.exe

  • Size

    291KB

  • MD5

    fd8dbbff11893d8010cea56e7a8d5370

  • SHA1

    b476bf5ac599b956beeb705c24fbb1a524ba4d7f

  • SHA256

    72d4546c8928cf3e62f19543654da10b704cb1588458f0cc90ec0aaf62dc5d5c

  • SHA512

    60742cecc99e9b2911dfa8a8b822cfaefa5ad109c87a026cf7f67c1e5ada78b12e81c76b29ea7bf171f622ef3012c1737f78fca68d4b850073b4a9fcbcd3b458

  • SSDEEP

    3072:bEgzu/rJWHjv0Zx7t/u5McqTMO53h6CzFBLCpG+kPO9VWZpzQg4e8efzu8dP7HRq:bzktCMcqTMqLCpkO9qpBX8efzNTTOUY

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\SHARPIL.exe
    "C:\Users\Admin\AppData\Local\Temp\SHARPIL.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpCE44.tmp.dat

    Filesize

    116KB

    MD5

    f70aa3fa04f0536280f872ad17973c3d

    SHA1

    50a7b889329a92de1b272d0ecf5fce87395d3123

    SHA256

    8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

    SHA512

    30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

  • C:\Users\Admin\AppData\Local\Temp\tmpCE48.tmp.dat

    Filesize

    124KB

    MD5

    9618e15b04a4ddb39ed6c496575f6f95

    SHA1

    1c28f8750e5555776b3c80b187c5d15a443a7412

    SHA256

    a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

    SHA512

    f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

  • C:\Users\Admin\AppData\Roaming\WindowsBrandOr\Process.txt

    Filesize

    732B

    MD5

    b3d2f85f883a23f65b162324ca1490a1

    SHA1

    606224479001e44cb50c3ca11c1b8814a7e2c14a

    SHA256

    812d511fe64f0457d5eda309bcb6d16271141e1843474e81dac29b2db78e99f7

    SHA512

    8be12b92329f4b7703a238a9718d543598c38a65a17fb6efbfd35293ec3837f4e9a05922a6229635ce1698fbfe78dc0151fa2bee0977070184ba3d74db64bebc

  • C:\Users\Admin\AppData\Roaming\WindowsBrandOr\Process.txt

    Filesize

    1KB

    MD5

    fdca61b82e78120973a3cb452312db95

    SHA1

    cba0f1a50c4d812b5b5f5c1a0474b4ebddebc3e9

    SHA256

    dbbe065409ff8f5ab8ad01c20983a393e0b3f0c2ab4f5625d0f736007dd897ff

    SHA512

    63e603d7accf9f4585a5f44f0fefb03849b6938dab6af705cb769978f23254e00cc1179193c03562c078cd56ee6371134185462256ff3431270b85c132d3ccc2

  • C:\Users\Admin\AppData\Roaming\WindowsBrandOr\Process.txt

    Filesize

    165B

    MD5

    3e6a66671941dd1a86e83b94f0595555

    SHA1

    26309d006337599a2f918434b7035cb2c82767f0

    SHA256

    abe21a2a3e39007e6da03ee59250287382b426d02e6ff8eca43c8ed871eafc96

    SHA512

    99960cd216bf6296ee16f5d155305050b2e464398234a46e8fc7662661a0e08b544b635e835d2ec70b98baf5645b4c38639826b622f55585cebec09e0e3dbd5a

  • memory/3680-4-0x0000000005FA0000-0x0000000006016000-memory.dmp

    Filesize

    472KB

  • memory/3680-5-0x0000000005F40000-0x0000000005F5E000-memory.dmp

    Filesize

    120KB

  • memory/3680-19-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/3680-20-0x0000000006A10000-0x0000000006FB4000-memory.dmp

    Filesize

    5.6MB

  • memory/3680-3-0x0000000005ED0000-0x0000000005F20000-memory.dmp

    Filesize

    320KB

  • memory/3680-2-0x00000000749F0000-0x00000000751A0000-memory.dmp

    Filesize

    7.7MB

  • memory/3680-1-0x0000000000640000-0x0000000000690000-memory.dmp

    Filesize

    320KB

  • memory/3680-0-0x00000000749FE000-0x00000000749FF000-memory.dmp

    Filesize

    4KB

  • memory/3680-155-0x0000000006FC0000-0x0000000007026000-memory.dmp

    Filesize

    408KB

  • memory/3680-157-0x00000000069C0000-0x00000000069D2000-memory.dmp

    Filesize

    72KB

  • memory/3680-176-0x00000000749F0000-0x00000000751A0000-memory.dmp

    Filesize

    7.7MB