Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2022 18:20

General

  • Target

    917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe

  • Size

    16.2MB

  • MD5

    3787b54080f56cc039b53f9ad7ba1f61

  • SHA1

    35270864aef6783737c630da599476d8461a475b

  • SHA256

    917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387

  • SHA512

    caf2db2e610afc1199934da92f53ac12222bd3501ce650216460224cea094059684d9ec97924ef237adefc46ed229bc5f3189c1395203a1a4e627c3a1f9e4065

  • SSDEEP

    393216:MWzJRvnNN/gNzAijN9i4cJNjhy4ZkPz4uGtULyvvytqACvw7cB:nTYzAi59if5kqtULyvvGqACvZB

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe
    "C:\Users\Admin\AppData\Local\Temp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp" /SL5="$A01CA,16720538,56832,C:\Users\Admin\AppData\Local\Temp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.exe"
      2⤵
      • Executes dropped EXE
      PID:1520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp

    Filesize

    702KB

    MD5

    e470dc0989b8713ea215450228e0c714

    SHA1

    f2df3fd29919421a9f55f471d9fa70aea3751f59

    SHA256

    838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635

    SHA512

    822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7

  • C:\Users\Admin\AppData\Local\Temp\is-I5OV6.tmp\917625bfa1d5c79d8043a9300623ca11b0f17de8f8159d4c562ab1169ad76387.tmp

    Filesize

    702KB

    MD5

    e470dc0989b8713ea215450228e0c714

    SHA1

    f2df3fd29919421a9f55f471d9fa70aea3751f59

    SHA256

    838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635

    SHA512

    822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7

  • memory/1456-132-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1456-134-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1456-138-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1520-135-0x0000000000000000-mapping.dmp