Analysis

  • max time kernel
    3s
  • max time network
    2s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2025 07:05

General

  • Target

    USBDeview.exe

  • Size

    13.1MB

  • MD5

    efc6bc106dcb06ad195b25c762fc543d

  • SHA1

    6924ac620f69e7d80bc4d7478b1e2b067db1fe44

  • SHA256

    c13f5da2c9d22e3bf060905c200afe87b14c52253e0742799f28b3d2e2a03cec

  • SHA512

    aaaa55c8d6bafb635259e2ca9ee4dfc7af581434a917964bf86862a3d5e3c4d7f0bd99d94b0bffabc02c8b6c1e1abbe17371ce2266463f0cd9fa593f40b9dffb

  • SSDEEP

    393216:dtq5hSKQaJhsFekIQ6aMbk4DAASyvGcu6oD:dtAPfQ6vfSyucP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\USBDeview.exe
    "C:\Users\Admin\AppData\Local\Temp\USBDeview.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Users\Admin\AppData\Local\Temp\onefile_840_133839903664622000\RuntimeBrokerVers.exe
      "C:\Users\Admin\AppData\Local\Temp\USBDeview.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\onefile_840_133839903664622000\python311.dll

    Filesize

    5.5MB

    MD5

    5a5dd7cad8028097842b0afef45bfbcf

    SHA1

    e247a2e460687c607253949c52ae2801ff35dc4a

    SHA256

    a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce

    SHA512

    e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858

  • \Users\Admin\AppData\Local\Temp\onefile_840_133839903664622000\RuntimeBrokerVers.exe

    Filesize

    23.4MB

    MD5

    0e643167d3c1f0a04a8d8ddf6c12221f

    SHA1

    a6eb7b567b127dd9f2e4314e3a67c14877cafc09

    SHA256

    0fcb76be771680277b363dfd78f63082465f0ffc8956b396f343f7747174f53f

    SHA512

    25ce0f57f0b622344b0fd9365e5fccbcaafbf499334347b8ee19fcb4ba1050ec1a52e32467483865238999211a4ffa229214f17be88a5060274ae909d294ac40