Analysis

  • max time kernel
    403s
  • max time network
    456s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 14:32

General

  • Target

    f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe

  • Size

    3.3MB

  • MD5

    1c4b3684c5dd11a1a462a9516f90f05e

  • SHA1

    39805472d2f5b72b57fdd7385d097e0a368de3cd

  • SHA256

    f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6

  • SHA512

    c6da7bb30cff49be9f18ec9fcc9708316d1ee467d8be3a616745bc80bfaaf2ce894face06149c7e086e5671d640c25c6cd46b31e2bc8cc11e0059b8f1e1fec27

  • SSDEEP

    98304:T3YobVRxj94j/JpY6A7PFLiWg5RxjUZzJ:7YeujnY6aIrYZ9

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe
    "C:\Users\Admin\AppData\Local\Temp\f97f4404be87513240a9a48bfc726de92e94e5342b5833de7bf303e05c8fc6c6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe
      C:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\is-5HLFM.tmp\drvprosetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-5HLFM.tmp\drvprosetup.tmp" /SL5="$120028,2543061,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT
        3⤵
        • Executes dropped EXE
        PID:2596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe

    Filesize

    2.9MB

    MD5

    20a1ff6efbfc6d83a0a6008f45914e9e

    SHA1

    c3bda8bb56403824402e825ec2c7e022e7d31c13

    SHA256

    508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828

    SHA512

    4b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23

  • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe

    Filesize

    2.9MB

    MD5

    20a1ff6efbfc6d83a0a6008f45914e9e

    SHA1

    c3bda8bb56403824402e825ec2c7e022e7d31c13

    SHA256

    508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828

    SHA512

    4b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23

  • C:\Users\Admin\AppData\Local\Temp\is-5HLFM.tmp\drvprosetup.tmp

    Filesize

    1.1MB

    MD5

    938604f6ac59637bac93477c279247b2

    SHA1

    7d463ead499fb69ee4d785429ba8783b5bbef43a

    SHA256

    38a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3

    SHA512

    2e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb

  • C:\Users\Admin\AppData\Local\Temp\is-5HLFM.tmp\drvprosetup.tmp

    Filesize

    1.1MB

    MD5

    938604f6ac59637bac93477c279247b2

    SHA1

    7d463ead499fb69ee4d785429ba8783b5bbef43a

    SHA256

    38a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3

    SHA512

    2e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb

  • memory/1132-132-0x0000000000000000-mapping.dmp

  • memory/1132-135-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1132-136-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2596-137-0x0000000000000000-mapping.dmp