Resubmissions

17-03-2021 08:48

210317-xv9yl2r5hn 10

16-03-2021 19:29

210316-6pes49a322 8

Analysis

  • max time kernel
    12s
  • max time network
    66s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-03-2021 08:48

General

  • Target

    e00743a06378fdc48df81c57ff27c80c.exe

  • Size

    799KB

  • MD5

    e00743a06378fdc48df81c57ff27c80c

  • SHA1

    644eef3bb78b0e340b2f4977dc0c17b26889603b

  • SHA256

    e3ac84aeb4c0a6606a5e385327f371c36335954f27ec4151d616fbb73d466e37

  • SHA512

    4d573618672bd491916753363403dd401db21a287aa3f35c7264478bf237b3aed9e14f1da868709d10e034fa30222f3e47b6acd796df6aad08be31652a023e1f

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e00743a06378fdc48df81c57ff27c80c.exe
    "C:\Users\Admin\AppData\Local\Temp\e00743a06378fdc48df81c57ff27c80c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Users\Admin\AppData\Local\Temp\is-IFOES.tmp\e00743a06378fdc48df81c57ff27c80c.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-IFOES.tmp\e00743a06378fdc48df81c57ff27c80c.tmp" /SL5="$20114,570602,58368,C:\Users\Admin\AppData\Local\Temp\e00743a06378fdc48df81c57ff27c80c.exe"
      2⤵
      • Executes dropped EXE
      PID:3148

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-IFOES.tmp\e00743a06378fdc48df81c57ff27c80c.tmp
    MD5

    1afbd25db5c9a90fe05309f7c4fbcf09

    SHA1

    baf330b5c249ca925b4ea19a52fe8b2c27e547fa

    SHA256

    3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

    SHA512

    3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

  • memory/896-4-0x0000000000401000-0x000000000040C000-memory.dmp
    Filesize

    44KB

  • memory/3148-2-0x0000000000000000-mapping.dmp
  • memory/3148-5-0x00000000001E0000-0x00000000001E1000-memory.dmp
    Filesize

    4KB