Analysis
-
max time kernel
171s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 09:37
Static task
static1
Behavioral task
behavioral1
Sample
9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe
Resource
win10v2004-20220812-en
General
-
Target
9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe
-
Size
656KB
-
MD5
4359747ead7ddc767e0de29632809279
-
SHA1
4b95e404f60c7f787a88e4915d37e78b6d2c7b67
-
SHA256
9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43
-
SHA512
39c4887f9b282bd5663db850923a7bb7886173af4124d8b6f11ba317136cd0c07f9626cd30fe627a728f0aa9b277123e9f35e1a45c673c4523449528d84e53c9
-
SSDEEP
12288:jZXftr5H9HGxhu8cmJ/5UvisvPQ5u78uaNBwIfJ3GOQ7DbTZKpWPNEtmn1WCLza3:jpftddmxh2q5UisnV8nnRfprQ7DbVKiY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 788 9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 788 4968 9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe 80 PID 4968 wrote to memory of 788 4968 9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe 80 PID 4968 wrote to memory of 788 4968 9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe"C:\Users\Admin\AppData\Local\Temp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp"C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp" /SL5="$B01CE,413888,52736,C:\Users\Admin\AppData\Local\Temp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.exe"2⤵
- Executes dropped EXE
PID:788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp
Filesize700KB
MD588a0387e20eaac468789990b0e0bb19f
SHA1aa0caaa9c0f7bebad4b5935813bd56a7c0700c85
SHA25614e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f
SHA51272689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640
-
C:\Users\Admin\AppData\Local\Temp\is-H9T94.tmp\9c8b5ec88a39b6d2f972e33ee11e1ed0e9cd593288e2f686adb4ff0ce6b81a43.tmp
Filesize700KB
MD588a0387e20eaac468789990b0e0bb19f
SHA1aa0caaa9c0f7bebad4b5935813bd56a7c0700c85
SHA25614e711509c689cf9bf3de95cfa102fb70e994a45d33fa471e077e5d184be292f
SHA51272689c6e8cff01d85a840c824700776ce2182ca10e53af2c5126de069308572cafe92e47eba324c2fd5642129bfe743ea8dc48f3d61f91aef7824bca8ec9b640