Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2022 21:57
Static task
static1
Behavioral task
behavioral1
Sample
6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe
Resource
win10v2004-20220901-en
General
-
Target
6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe
-
Size
13.4MB
-
MD5
5190e1f9715babd96b5ce50d6b0fc126
-
SHA1
d30ffa3f160650defb1c6a4ec710e33ce78dbc9e
-
SHA256
6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd
-
SHA512
c7906b42c618a1f305a7fc2f352852339b558424382ac411eda2c781637ef89d1fa6e65f0b51f7f0ab24d767b0bb9c5f72cb82d8962e8719376df51b9a1aa9e3
-
SSDEEP
393216:H69xMNyqXfwJTATDtKAbxKBSBqBTneng92y:aSycETAPtBb8BSBq1bV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3404 6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3404 2732 6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe 80 PID 2732 wrote to memory of 3404 2732 6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe 80 PID 2732 wrote to memory of 3404 2732 6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe"C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp"C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp" /SL5="$E01BA,13383306,721408,C:\Users\Admin\AppData\Local\Temp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.exe"2⤵
- Executes dropped EXE
PID:3404
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp
Filesize2.4MB
MD571d1ca41a5b735bfa4373267720891ec
SHA1971f80289770bdeb2e06a70c321e9bcbabc56be2
SHA256a0c8d94291aabc9fcd223c80dc8f49f82db4e3b744a9a21e5e65e0c07c389f7f
SHA512e8e9412660bf3cf580f9f0adca2da6c215aed2f8b3cf627abc8f7809aa6059becb3ae1a2af979133f1e880e66b75bf72ae1a510cc026ecc5499e59101216d7f2
-
C:\Users\Admin\AppData\Local\Temp\is-GCGFH.tmp\6e588b04d3db0e594ac04c2f192f68c27ee2cf5d5acf27d8a71bd04fafbf58cd.tmp
Filesize2.4MB
MD571d1ca41a5b735bfa4373267720891ec
SHA1971f80289770bdeb2e06a70c321e9bcbabc56be2
SHA256a0c8d94291aabc9fcd223c80dc8f49f82db4e3b744a9a21e5e65e0c07c389f7f
SHA512e8e9412660bf3cf580f9f0adca2da6c215aed2f8b3cf627abc8f7809aa6059becb3ae1a2af979133f1e880e66b75bf72ae1a510cc026ecc5499e59101216d7f2