Analysis

  • max time kernel
    61s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2022 21:57

General

  • Target

    6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe

  • Size

    13.4MB

  • MD5

    5190e1f9715babd96b5ce50d6b0fc126

  • SHA1

    d30ffa3f160650defb1c6a4ec710e33ce78dbc9e

  • SHA256

    6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd

  • SHA512

    c7906b42c618a1f305a7fc2f352852339b558424382ac411eda2c781637ef89d1fa6e65f0b51f7f0ab24d767b0bb9c5f72cb82d8962e8719376df51b9a1aa9e3

  • SSDEEP

    393216:H69xMNyqXfwJTATDtKAbxKBSBqBTneng92y:aSycETAPtBb8BSBq1bV

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe
    "C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp" /SL5="$E01BA,13383306,721408,C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe"
      2⤵
      • Executes dropped EXE
      PID:3404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp

    Filesize

    2.4MB

    MD5

    71d1ca41a5b735bfa4373267720891ec

    SHA1

    971f80289770bdeb2e06a70c321e9bcbabc56be2

    SHA256

    a0c8d94291aabc9fcd223c80dc8f49f82db4e3b744a9a21e5e65e0c07c389f7f

    SHA512

    e8e9412660bf3cf580f9f0adca2da6c215aed2f8b3cf627abc8f7809aa6059becb3ae1a2af979133f1e880e66b75bf72ae1a510cc026ecc5499e59101216d7f2

  • C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp

    Filesize

    2.4MB

    MD5

    71d1ca41a5b735bfa4373267720891ec

    SHA1

    971f80289770bdeb2e06a70c321e9bcbabc56be2

    SHA256

    a0c8d94291aabc9fcd223c80dc8f49f82db4e3b744a9a21e5e65e0c07c389f7f

    SHA512

    e8e9412660bf3cf580f9f0adca2da6c215aed2f8b3cf627abc8f7809aa6059becb3ae1a2af979133f1e880e66b75bf72ae1a510cc026ecc5499e59101216d7f2

  • memory/2732-132-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2732-134-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2732-138-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/3404-135-0x0000000000000000-mapping.dmp