Analysis

  • max time kernel
    132s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    24-03-2022 08:58

General

  • Target

    8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe

  • Size

    986KB

  • MD5

    5fc34a006fa51232dbe699fe709f05b6

  • SHA1

    a0840039cd6f7777809c685b38017882935fbc99

  • SHA256

    8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d

  • SHA512

    e6dbf213009a0cd736abcc145ccd97c2199f445512651a6b7a305e22171a70706fd7014414b811b8e0f26a0ee8b7e310c70ff1aa20b46a0477c3ff2c99921a2c

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe
    "C:\Users\Admin\AppData\Local\Temp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\is-DOTIN.tmp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-DOTIN.tmp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp" /SL5="$5011E,757510,121344,C:\Users\Admin\AppData\Local\Temp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.exe"
      2⤵
      • Executes dropped EXE
      PID:4892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-DOTIN.tmp\8ac739156d3123d83e2e4ac46be9507f500951ec46dde96319e2483f40be407d.tmp
    MD5

    1a8ac942e4c2302d349caaed9943360d

    SHA1

    a08ce743c3d90a2b713db3e58e747e7a00a32590

    SHA256

    db8341fc8e86f7b80fbe144aa9ceea3e3369b64dcd5998c5a7f186c304cfeb96

    SHA512

    d65e4f9846bb6fba5a8b4f9409b2576af041dfa9b453800c298ec810bd27cfcf28d1933bc79893aa79323654ab4b85e321b03eaf17d67f0e19c79749751e4aab

  • memory/2684-134-0x0000000000400000-0x0000000000425000-memory.dmp
    Filesize

    148KB

  • memory/2684-136-0x0000000000400000-0x0000000000425000-memory.dmp
    Filesize

    148KB

  • memory/4892-137-0x0000000000000000-mapping.dmp