Analysis
-
max time kernel
130s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2022 20:40
Static task
static1
Behavioral task
behavioral1
Sample
785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe
Resource
win10v2004-20220812-en
General
-
Target
785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe
-
Size
18.1MB
-
MD5
318dd5734dd130913443b07c6dc4b42a
-
SHA1
079cac381bef21de76646d2cfd63c7d833e26ac1
-
SHA256
785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6
-
SHA512
4c67251e376fda85ac89c351f656102184b096f93a693276d3512f0d0d0cee5cab6fddb646c4c7d6eebc6bf55a5ba8099dbbf4e363c5fa75fe22b478ab3536be
-
SSDEEP
393216:gPpB9j1cUmqfbov2cgUBqJPxZGUhVw70zNNR1I:gPpBcRMoPBqJPjGUhVwwxpI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1920 785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 764 wrote to memory of 1920 764 785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe 81 PID 764 wrote to memory of 1920 764 785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe 81 PID 764 wrote to memory of 1920 764 785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe"C:\Users\Admin\AppData\Local\Temp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp"C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp" /SL5="$801C4,18316842,730624,C:\Users\Admin\AppData\Local\Temp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.exe"2⤵
- Executes dropped EXE
PID:1920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp
Filesize2.4MB
MD5d455536c6df9053a4eea2fcf2f200d2a
SHA15971a466f7cdba104a73a8590de3ca3abc6de8e6
SHA25618bf06a1bef24f150bccb2be707ea070cc3ff7ef0c519cd9b3c5b7bc888505bf
SHA512e2da8ce300aad4e23cbd61c9c978ef0250748368a1adc9ef51b97153eab12631654b1444323330215b31cb68ec9677049dde5ee6080d1606a9dbd6cb98c42ab9
-
C:\Users\Admin\AppData\Local\Temp\is-06IVK.tmp\785f72ca0fc25ec6a75aaa06b5746b53016e25b3a50f5dc05eb49d1159db24a6.tmp
Filesize2.4MB
MD5d455536c6df9053a4eea2fcf2f200d2a
SHA15971a466f7cdba104a73a8590de3ca3abc6de8e6
SHA25618bf06a1bef24f150bccb2be707ea070cc3ff7ef0c519cd9b3c5b7bc888505bf
SHA512e2da8ce300aad4e23cbd61c9c978ef0250748368a1adc9ef51b97153eab12631654b1444323330215b31cb68ec9677049dde5ee6080d1606a9dbd6cb98c42ab9