Analysis

  • max time kernel
    98s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 04:46

General

  • Target

    2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.exe

  • Size

    1.5MB

  • MD5

    9402e9ea578ad7ebab830b99d84c56b9

  • SHA1

    2d5fcf8b4f5c388801caf620addaa3f0cb498bd8

  • SHA256

    2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6

  • SHA512

    f0b1a8dbc08e5bf978cac7598d3698b26ca11a7c6d04a818d12b5cd7883ad3a09399dffc7fb07246689152977a3b7dea24cad97afd75007586bfac7fbb7f4e46

  • SSDEEP

    24576:yQi/5NrIWMq3+zR+HMd0p5o7cAneZqT0OQN5QcDmEzp5wbqlBYg3o/xNFMMBTlPX:y9xLmRw2+ZA9c7Hzp8OBf4MGpfz

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.exe
    "C:\Users\Admin\AppData\Local\Temp\2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\is-ML7VA.tmp\2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ML7VA.tmp\2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.tmp" /SL5="$210022,1315205,56832,C:\Users\Admin\AppData\Local\Temp\2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.exe"
      2⤵
      • Executes dropped EXE
      PID:3652

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-ML7VA.tmp\2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.tmp

          Filesize

          691KB

          MD5

          9303156631ee2436db23827e27337be4

          SHA1

          018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

          SHA256

          bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

          SHA512

          9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

        • C:\Users\Admin\AppData\Local\Temp\is-ML7VA.tmp\2994671fe8da5b00897da1ba2097b14697cf91ac42af960c9f31245427e4d2c6.tmp

          Filesize

          691KB

          MD5

          9303156631ee2436db23827e27337be4

          SHA1

          018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

          SHA256

          bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

          SHA512

          9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

        • memory/1456-132-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1456-134-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/1456-138-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB