Analysis

  • max time kernel
    123s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-11-2020 10:45

General

  • Target

    0x000100000001ab9c-70.exe

  • Size

    977KB

  • MD5

    5c6684e8c2b678de9e2776c6b50ddd72

  • SHA1

    7d255100d811de745e6ee908d1e0f8ba4ff21add

  • SHA256

    bb5d2c07ce902c78227325bf5f336c04335874445fc0635a6b67ae5ba9d2fefc

  • SHA512

    f627ca67610f9d5c137bdae8b3f8f6c08ff9162d12b3e30d3886c72aec047d34e31b5f0e17120dc99d71b0c316e43bb946fc5d40a9babec7229ce3a3c9292acb

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x000100000001ab9c-70.exe
    "C:\Users\Admin\AppData\Local\Temp\0x000100000001ab9c-70.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Users\Admin\AppData\Local\Temp\is-HUKR7.tmp\0x000100000001ab9c-70.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-HUKR7.tmp\0x000100000001ab9c-70.tmp" /SL5="$5007A,748569,121344,C:\Users\Admin\AppData\Local\Temp\0x000100000001ab9c-70.exe"
      2⤵
      • Executes dropped EXE
      PID:3644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-HUKR7.tmp\0x000100000001ab9c-70.tmp
    MD5

    1a8ac942e4c2302d349caaed9943360d

    SHA1

    a08ce743c3d90a2b713db3e58e747e7a00a32590

    SHA256

    db8341fc8e86f7b80fbe144aa9ceea3e3369b64dcd5998c5a7f186c304cfeb96

    SHA512

    d65e4f9846bb6fba5a8b4f9409b2576af041dfa9b453800c298ec810bd27cfcf28d1933bc79893aa79323654ab4b85e321b03eaf17d67f0e19c79749751e4aab

  • memory/3644-0-0x0000000000000000-mapping.dmp