Analysis

  • max time kernel
    379s
  • max time network
    449s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 14:33

General

  • Target

    9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe

  • Size

    3.3MB

  • MD5

    e8231bacbb28664f17be611e0ed865d4

  • SHA1

    8794e939f3eeaeae58914b65588b6552cd486941

  • SHA256

    9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095

  • SHA512

    69465604b9eaaea38e1b960255744fa0c28a5592f38198c68b2d21555f9f33c3459eeeb54451d4606e5455e07e6a9964eeedb18e44f4663f8fe36467a82dbd6d

  • SSDEEP

    98304:N3YobVRxj94j/JpY6A7PFLiWg5RxjUZzu:hYeujnY6aIrYZS

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe
    "C:\Users\Admin\AppData\Local\Temp\9be793f144082b87bc536684828a04ea0f71385d5fd3b2d62f237f934eff6095.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe
      C:\Users\Admin\AppData\Local\Temp\\drvprosetup.exe /VERYSILENT
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Users\Admin\AppData\Local\Temp\is-7LIR0.tmp\drvprosetup.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-7LIR0.tmp\drvprosetup.tmp" /SL5="$E0066,2543061,85504,C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe" /VERYSILENT
        3⤵
        • Executes dropped EXE
        PID:4500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe

    Filesize

    2.9MB

    MD5

    20a1ff6efbfc6d83a0a6008f45914e9e

    SHA1

    c3bda8bb56403824402e825ec2c7e022e7d31c13

    SHA256

    508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828

    SHA512

    4b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23

  • C:\Users\Admin\AppData\Local\Temp\drvprosetup.exe

    Filesize

    2.9MB

    MD5

    20a1ff6efbfc6d83a0a6008f45914e9e

    SHA1

    c3bda8bb56403824402e825ec2c7e022e7d31c13

    SHA256

    508060dc54b63e210eb42a4f0519a7eb09ac8c1138084b078795ba9bb2bd0828

    SHA512

    4b3d5d159f5d660b29a6908cf23336272afe475b479a70ba2de5dc067106f2d026f13ccffd43318611e96f2dc4cd1f770474a288a26ebee59a31db891c461f23

  • C:\Users\Admin\AppData\Local\Temp\is-7LIR0.tmp\drvprosetup.tmp

    Filesize

    1.1MB

    MD5

    938604f6ac59637bac93477c279247b2

    SHA1

    7d463ead499fb69ee4d785429ba8783b5bbef43a

    SHA256

    38a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3

    SHA512

    2e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb

  • C:\Users\Admin\AppData\Local\Temp\is-7LIR0.tmp\drvprosetup.tmp

    Filesize

    1.1MB

    MD5

    938604f6ac59637bac93477c279247b2

    SHA1

    7d463ead499fb69ee4d785429ba8783b5bbef43a

    SHA256

    38a41372c1ca922a7aa14c82fd09656c0d168acf9cbc481b8e3d05f2302bcce3

    SHA512

    2e22e8c7c4f0652bba62eec7e8103e530c0a6a5a61aedb13bf2501ffa158bc02a3efbdb36684fa80b282b50225e5e1385dd27b25c98a7b18eb97e55d445fd3eb

  • memory/612-132-0x0000000000000000-mapping.dmp

  • memory/612-135-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/612-139-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4500-136-0x0000000000000000-mapping.dmp