Analysis

  • max time kernel
    117s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    30-09-2021 20:28

General

  • Target

    422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe

  • Size

    2.3MB

  • MD5

    8642406e609c7d9cd085d69862c2d4c3

  • SHA1

    60e7c3172025a993882d6b180d4b74f3287893ef

  • SHA256

    422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010

  • SHA512

    c6d357bbb69379990fa31ec8a958ec5a5cb8b0f80870e72fc67e06049975bde3f998fae22e7ae9974cbbf53a56e6129bb8b6e4db5459028e7327ee238e277d82

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe
    "C:\Users\Admin\AppData\Local\Temp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Users\Admin\AppData\Local\Temp\is-FVQ86.tmp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-FVQ86.tmp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.tmp" /SL5="$7007A,1569491,780800,C:\Users\Admin\AppData\Local\Temp\422fc326d35abe98438c2fd8418d134ddb3fb20bc54c62486f9b963cda3d5010_422fc326d35abe98438c2fd8418d134ddb3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2056-116-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2364-119-0x0000000000810000-0x0000000000811000-memory.dmp

    Filesize

    4KB

  • memory/2364-123-0x0000000004C80000-0x0000000004C8F000-memory.dmp

    Filesize

    60KB