Analysis

  • max time kernel
    362s
  • max time network
    420s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 14:32

General

  • Target

    f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe

  • Size

    3.3MB

  • MD5

    d51d2ae27240253d256eb407146b0b95

  • SHA1

    4ef90358186ff8c336b9cba939518bcb79a8c22f

  • SHA256

    f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1

  • SHA512

    9dbe71eba2605f3cecbb49767121843c13070ebe3d08b71855efb12a108c0637a5a21b8f3454f48789d99727e8ed28856ccc3f4da75d3c0c0b726994ddce2add

  • SSDEEP

    98304:33YobVRxj94j/JpY6A7PFLiWg5RxjUZzc:nYeujnY6aIrYZY

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe
    "C:\Users\Admin\AppData\Local\Temp\f8891f8e330eff8fc7f6311c893c5b3b9d348d9677947ba2e190e65aebb7ecb1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe
      C:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4156
      • C:\Users\Admin\AppData\Local\Temp\is-MO1HI.tmp\drvprosetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-MO1HI.tmp\drvprosetup.tmp" /SL5="$C006C,2543061,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:1608

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe

    Filesize

    2.9MB

    MD5

    20a1ff6efbfc6d83a0a6008f45914e9e

    SHA1

    c3bda8bb56403824402e825ec2c7e022e7d31c13

    SHA256

    508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828

    SHA512

    4b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23

  • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe

    Filesize

    2.9MB

    MD5

    20a1ff6efbfc6d83a0a6008f45914e9e

    SHA1

    c3bda8bb56403824402e825ec2c7e022e7d31c13

    SHA256

    508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828

    SHA512

    4b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23

  • C:\Users\Admin\AppData\Local\Temp\is-MO1HI.tmp\drvprosetup.tmp

    Filesize

    1.1MB

    MD5

    938604f6ac59637bac93477c279247b2

    SHA1

    7d463ead499fb69ee4d785429ba8783b5bbef43a

    SHA256

    38a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3

    SHA512

    2e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb

  • C:\Users\Admin\AppData\Local\Temp\is-MO1HI.tmp\drvprosetup.tmp

    Filesize

    1.1MB

    MD5

    938604f6ac59637bac93477c279247b2

    SHA1

    7d463ead499fb69ee4d785429ba8783b5bbef43a

    SHA256

    38a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3

    SHA512

    2e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb

  • memory/1608-137-0x0000000000000000-mapping.dmp

  • memory/4156-132-0x0000000000000000-mapping.dmp

  • memory/4156-135-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4156-136-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB