Analysis

  • max time kernel
    130s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2022 20:40

General

  • Target

    785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe

  • Size

    18.1MB

  • MD5

    318dd5734dd130913443b07c6dc4b42a

  • SHA1

    079cac381bef21de76646d2cfd63c7d833e26ac1

  • SHA256

    785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6

  • SHA512

    4c67251e376fda85ac89c351f656102184b096f93a693276d3512f0d0d0cee5cab6fddb646c4c7d6eebc6bf55a5ba8099dbbf4e363c5fa75fe22b478ab3536be

  • SSDEEP

    393216:gPpB9j1cUmqfbov2cgUBqJPxZGUhVw70zNNR1I:gPpBcRMoPBqJPjGUhVwwxpI

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe
    "C:\Users\Admin\AppData\Local\Temp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp" /SL5="$801C4,18316842,730624,C:\Users\Admin\AppData\Local\Temp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe"
      2⤵
      • Executes dropped EXE
      PID:1920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp

    Filesize

    2.4MB

    MD5

    d455536c6df9053a4eea2fcf2f200d2a

    SHA1

    5971a466f7cdba104a73a8590de3ca3abc6de8e6

    SHA256

    18bf06a1bef24f150bccb2be707ea070cc3ff7ef0c519cd9b3c5b7bc888505bf

    SHA512

    e2da8ce300aad4e23cbd61c9c978ef0250748368a1adc9ef51b97153eab12631654b1444323330215b31cb68ec9677049dde5ee6080d1606a9dbd6cb98c42ab9

  • C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp

    Filesize

    2.4MB

    MD5

    d455536c6df9053a4eea2fcf2f200d2a

    SHA1

    5971a466f7cdba104a73a8590de3ca3abc6de8e6

    SHA256

    18bf06a1bef24f150bccb2be707ea070cc3ff7ef0c519cd9b3c5b7bc888505bf

    SHA512

    e2da8ce300aad4e23cbd61c9c978ef0250748368a1adc9ef51b97153eab12631654b1444323330215b31cb68ec9677049dde5ee6080d1606a9dbd6cb98c42ab9

  • memory/764-132-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/764-137-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/764-138-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB