Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/10/2022, 15:47

General

  • Target

    d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.exe

  • Size

    20.2MB

  • MD5

    3baaf9cf569509e8ea7484d013ff7da9

  • SHA1

    5a84a1d1d6e30e95190846e42170705430a9d1e0

  • SHA256

    d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b

  • SHA512

    766f19b677b201ca1ca0574d148c9b96d44be6c85502a3c1851b54ef50c1a425693c20e8c0010c7d52ae772ab8bea29d3747059115d7750a80295d9b1b0d971b

  • SSDEEP

    393216:btrqAW8mhxOSuIywemsN8Xt2UhFKPZuvLvcvlYL3+dFMjzheVin9w:bdqALmhx17FsN8XYAo4LLgMjzEVi9w

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.exe
    "C:\Users\Admin\AppData\Local\Temp\d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\is-37IC4.tmp\d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-37IC4.tmp\d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.tmp" /SL5="$E002E,20904272,324096,C:\Users\Admin\AppData\Local\Temp\d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.exe"
      2⤵
      • Executes dropped EXE
      PID:3600

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-37IC4.tmp\d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.tmp

    Filesize

    965KB

    MD5

    8665cfbfb77bed9b258085ca001234a3

    SHA1

    c25a6aae34ff3ba9bbe091635a18fe5d5a298314

    SHA256

    308fb723b4bdec4ee2825a390d8738c8bec306c4f3798fadfcdd4bc48e9b5f80

    SHA512

    fb748f8a131620af095e19231f885d076ad76a75b1b229cf548bcabcc99f0eba04c1057c6420992812faa8e431fb4124da6922bb14bd5b4acf8aabe75d8171c7

  • C:\Users\Admin\AppData\Local\Temp\is-37IC4.tmp\d909360cf49e79c8ca5d87a029ad7606729927dd1a082b06172c575c961c4c3b.tmp

    Filesize

    965KB

    MD5

    8665cfbfb77bed9b258085ca001234a3

    SHA1

    c25a6aae34ff3ba9bbe091635a18fe5d5a298314

    SHA256

    308fb723b4bdec4ee2825a390d8738c8bec306c4f3798fadfcdd4bc48e9b5f80

    SHA512

    fb748f8a131620af095e19231f885d076ad76a75b1b229cf548bcabcc99f0eba04c1057c6420992812faa8e431fb4124da6922bb14bd5b4acf8aabe75d8171c7

  • memory/5068-132-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/5068-137-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/5068-138-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB