Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 08:17

General

  • Target

    8593517ea14e2f38a906aece38cf9ac09de3bf480662be51bc0734243122ae4c.exe

  • Size

    929KB

  • MD5

    144e747132d60785b0ff1b83d9ca4270

  • SHA1

    f653b6b3bb48b0bd0b75b948275b2d2f0c20395d

  • SHA256

    8593517ea14e2f38a906aece38cf9ac09de3bf480662be51bc0734243122ae4c

  • SHA512

    4b30bd0c921199eb9d2605c9d3142bd0551141c3fb4f8252f8294e3919bd1a7389db15f5590cbddc2b20f81d26fb044fec1e265feef840ae344b809a1f67c80d

  • SSDEEP

    24576:4Q/l/uBCLEx8hVFal+tVxxMOIYbq1VDChQef26HzVEmLSsWg:4Q/E8AOhMaxyeqHWQefBHzVbLj/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8593517ea14e2f38a906aece38cf9ac09de3bf480662be51bc0734243122ae4c.exe
    "C:\Users\Admin\AppData\Local\Temp\8593517ea14e2f38a906aece38cf9ac09de3bf480662be51bc0734243122ae4c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\AppData\Local\Temp\sxeF062.tmp
      "C:\Users\Admin\AppData\Local\Temp\sxeF062.tmp"
      2⤵
      • Executes dropped EXE
      PID:3472

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\sxeEEBA.tmp

    Filesize

    15KB

    MD5

    bd815b61f9948f93aface4033fbb4423

    SHA1

    b5391484009b39053fc8b1bba63d444969bafcfa

    SHA256

    b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76

    SHA512

    a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71

  • C:\Users\Admin\AppData\Local\Temp\sxeEEBA.tmp

    Filesize

    15KB

    MD5

    bd815b61f9948f93aface4033fbb4423

    SHA1

    b5391484009b39053fc8b1bba63d444969bafcfa

    SHA256

    b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76

    SHA512

    a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71

  • C:\Users\Admin\AppData\Local\Temp\sxeF062.tmp

    Filesize

    2.0MB

    MD5

    a5831ab27dff92910ede6d41da4aa5f6

    SHA1

    7bec861a80593fef3cde01c37447f25d3b6029cc

    SHA256

    b4e2c8ba8043e804280cb7ea4c6dc76da897c14e6697ca57e2db73f65a57bf40

    SHA512

    f74b2bf639aa1ff270b1f64cc7e4ed098b51a4406972df595fe9cf686b3607e6661fa980c988aaebe17b127cc5e9d15487343b2e1931f0d5a2b56cf78c1b31aa

  • C:\Users\Admin\AppData\Local\Temp\sxeF062.tmp

    Filesize

    2.0MB

    MD5

    a5831ab27dff92910ede6d41da4aa5f6

    SHA1

    7bec861a80593fef3cde01c37447f25d3b6029cc

    SHA256

    b4e2c8ba8043e804280cb7ea4c6dc76da897c14e6697ca57e2db73f65a57bf40

    SHA512

    f74b2bf639aa1ff270b1f64cc7e4ed098b51a4406972df595fe9cf686b3607e6661fa980c988aaebe17b127cc5e9d15487343b2e1931f0d5a2b56cf78c1b31aa

  • memory/800-134-0x00000000025E1000-0x00000000025E3000-memory.dmp

    Filesize

    8KB

  • memory/3472-135-0x0000000000000000-mapping.dmp