Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2022, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe
Resource
win10v2004-20220812-en
General
-
Target
7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe
-
Size
2.0MB
-
MD5
3712c6289ae5b1b2721afdc020c3396b
-
SHA1
c931e5b631c77e21f40125ba2786dd0ef83edf14
-
SHA256
7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521
-
SHA512
0c83ed5bb3ae64c6d86ffca8446816fb9478d2c5ea9c40784fb006db088a57f7621589cd83ff78b625b55d0c956574da09bba05a8341852189f87acfdf3fbcef
-
SSDEEP
49152:qBuZrEUI8Xrhen9aeJ/FuD94yd0eMQhE1:MkLIor40+Fs94yV6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4396 7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4396 5088 7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe 84 PID 5088 wrote to memory of 4396 5088 7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe 84 PID 5088 wrote to memory of 4396 5088 7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe"C:\Users\Admin\AppData\Local\Temp\7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\is-P53I1.tmp\7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.tmp"C:\Users\Admin\AppData\Local\Temp\is-P53I1.tmp\7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.tmp" /SL5="$C0064,1132156,780800,C:\Users\Admin\AppData\Local\Temp\7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.exe"2⤵
- Executes dropped EXE
PID:4396
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-P53I1.tmp\7060dcd69db6990d1ec58c2078cd94a34bdbaaeb461e8a088ecf3e6abd502521.tmp
Filesize3.0MB
MD55177972b0df58e9b3f18acaa71b78f9f
SHA1c14240bf6d6086593fa17fd8b9b8d4cb9f48c9ce
SHA256963a2dd768c064d5ac967315958133ca00ca483b1e290e6d6ba4f783702a1fec
SHA5126b746a3468fb4d111bb7932aaa33349fc9e0f9fb5f2d1e2826bdaabefe8002b8f5f247c10b6f70d4a0e988e1e6b487983feae849d1a944e66935b81cde4cc5dd