Analysis
-
max time kernel
90s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2022 18:20
Static task
static1
Behavioral task
behavioral1
Sample
917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe
Resource
win10v2004-20220901-en
General
-
Target
917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe
-
Size
16.2MB
-
MD5
3787b54080f56cc039b53f9ad7ba1f61
-
SHA1
35270864aef6783737c630da599476d8461a475b
-
SHA256
917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387
-
SHA512
caf2db2e610afc1199934da92f53ac12222bd3501ce650216460224cea094059684d9ec97924ef237adefc46ed229bc5f3189c1395203a1a4e627c3a1f9e4065
-
SSDEEP
393216:MWzJRvnNN/gNzAijN9i4cJNjhy4ZkPz4uGtULyvvytqACvw7cB:nTYzAi59if5kqtULyvvGqACvZB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1520 917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1520 1456 917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe 85 PID 1456 wrote to memory of 1520 1456 917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe 85 PID 1456 wrote to memory of 1520 1456 917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe"C:\Users\Admin\AppData\Local\Temp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp"C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp" /SL5="$A01CA,16720538,56832,C:\Users\Admin\AppData\Local\Temp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe"2⤵
- Executes dropped EXE
PID:1520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp
Filesize702KB
MD5e470dc0989b8713ea215450228e0c714
SHA1f2df3fd29919421a9f55f471d9fa70aea3751f59
SHA256838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635
SHA512822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7
-
C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp
Filesize702KB
MD5e470dc0989b8713ea215450228e0c714
SHA1f2df3fd29919421a9f55f471d9fa70aea3751f59
SHA256838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635
SHA512822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7