Analysis

  • max time kernel
    171s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 09:37

General

  • Target

    9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe

  • Size

    656KB

  • MD5

    4359747ead7ddc767e0de29632809279

  • SHA1

    4b95e404f60c7f787a88e4915d37e78b6d2c7b67

  • SHA256

    9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43

  • SHA512

    39c4887f9b282bd5663db850923a7bb7886173af4124d8b6f11ba317136cd0c07f9626cd30fe627a728f0aa9b277123e9f35e1a45c673c4523449528d84e53c9

  • SSDEEP

    12288:jZXftr5H9HGxhu8cmJ/5UvisvPQ5u78uaNBwIfJ3GOQ7DbTZKpWPNEtmn1WCLza3:jpftddmxh2q5UisnV8nnRfprQ7DbVKiY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe
    "C:\Users\Admin\AppData\Local\Temp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp" /SL5="$B01CE,413888,52736,C:\Users\Admin\AppData\Local\Temp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe"
      2⤵
      • Executes dropped EXE
      PID:788

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp

          Filesize

          700KB

          MD5

          88a0387e20eaac468789990b0e0bb19f

          SHA1

          aa0caaa9c0f7bebad4b5935813bd56a7c0700c85

          SHA256

          14e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f

          SHA512

          72689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640

        • C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp

          Filesize

          700KB

          MD5

          88a0387e20eaac468789990b0e0bb19f

          SHA1

          aa0caaa9c0f7bebad4b5935813bd56a7c0700c85

          SHA256

          14e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f

          SHA512

          72689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640

        • memory/4968-132-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4968-134-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4968-138-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB