Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-11-2022 19:25

General

  • Target

    c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.exe

  • Size

    5.0MB

  • MD5

    74c1f4678b4c1084157f9390d74e1e12

  • SHA1

    7b31e4b8cb23f0c19b87a05e231df6ca6cc5b36d

  • SHA256

    c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd

  • SHA512

    ee334c910ffe8ff262f944d38ba9191937a24b910af90fc30943ea6e0aec63f31b749ce48cc9b003fcd1943717ef705984c89734284d78e9b54f904c403d78e3

  • SSDEEP

    98304:bZoREMhivcrausBFUlgxd8P4WZ1b+V758bQtLiBjjqHVWjoPwFRO22dxd0nf7:bZoREMUvc2usB6Qd8PV+V758bXjqCoPA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.exe
    "C:\Users\Admin\AppData\Local\Temp\c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\is-P7CQH.tmp\c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-P7CQH.tmp\c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.tmp" /SL5="$1D01DC,4968913,51712,C:\Users\Admin\AppData\Local\Temp\c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.exe"
      2⤵
      • Executes dropped EXE
      PID:1296

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-P7CQH.tmp\c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.tmp

    Filesize

    706KB

    MD5

    1a6c2b578c69b9388e22d38afa16a7fb

    SHA1

    186370d5438b1f5f3d75891aa8412e8edd00981c

    SHA256

    86ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3

    SHA512

    fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714

  • C:\Users\Admin\AppData\Local\Temp\is-P7CQH.tmp\c73260ebbf6e2df481dcee9927f24f141484b4ac39cc1f1cf589d2c4dbb3eacd.tmp

    Filesize

    706KB

    MD5

    1a6c2b578c69b9388e22d38afa16a7fb

    SHA1

    186370d5438b1f5f3d75891aa8412e8edd00981c

    SHA256

    86ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3

    SHA512

    fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714

  • memory/1712-132-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1712-137-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/1712-138-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB