Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2022 09:57
Static task
static1
Behavioral task
behavioral1
Sample
02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe
Resource
win10v2004-20220812-en
General
-
Target
02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe
-
Size
53.3MB
-
MD5
dbdc2a41b2f23842407935a3e27bfdb0
-
SHA1
53f11cc4cf8d703db3222cc891c4b33ab3d46160
-
SHA256
02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7
-
SHA512
adba50f9185aee5f902179bbf8d50e4dc604237f43010eaee8d49c26790b5415ff923eaa4be850f8c345e999708517f279dd3b16213f14ae430e063be4f74157
-
SSDEEP
1572864:u61mkRwhyttdGb50/3W1e6X3HlHWgcQry:ckeeGl0e46l2gW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1616 02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1616 4736 02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe 77 PID 4736 wrote to memory of 1616 4736 02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe 77 PID 4736 wrote to memory of 1616 4736 02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe"C:\Users\Admin\AppData\Local\Temp\02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\is-UG779.tmp\02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.tmp"C:\Users\Admin\AppData\Local\Temp\is-UG779.tmp\02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.tmp" /SL5="$601D4,55593527,57856,C:\Users\Admin\AppData\Local\Temp\02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.exe"2⤵
- Executes dropped EXE
PID:1616
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-UG779.tmp\02e2e189984a0b0ce4cae1478101bc9d64c6f060880ecf9fc421a61a23a5a6f7.tmp
Filesize697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49