Analysis

  • max time kernel
    254s
  • max time network
    285s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 01:56

General

  • Target

    49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe

  • Size

    2.5MB

  • MD5

    4ae76d80154dcb97d4ac61e22d3c9ef6

  • SHA1

    d2c117e9dd6e30acb3b4c28eba60f9ee1c5d5e9b

  • SHA256

    49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732

  • SHA512

    f85f357b7b02e7e047656752ccba2fc1e158dd5687f3a1ff7f89d64997abbd7b21008d099a69bd36fb6e978a79e2c098f3560a6c28e2a859965b35ed796364b0

  • SSDEEP

    49152:h1Os/PHVmVhYwiLtKkKyW4nFU0I+NP/f7I3lMOaYjdxvL0HT:h1OoHVl71RnFXINxv0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe
    "C:\Users\Admin\AppData\Local\Temp\49d62be43b892e5756b274f1d8ef8b032311a9142973d0098632350e366db732.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3360
    • C:\Users\Admin\AppData\Local\Temp\7zS5D6D.tmp\zWX3CbC7Ol7r1tC.exe
      .\zWX3CbC7Ol7r1tC.exe
      2⤵
      • Executes dropped EXE
      PID:3260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS5D6D.tmp\zWX3CbC7Ol7r1tC.dat
    Filesize

    7KB

    MD5

    bd8b572b5a1e023ce33bc2ecf5888a94

    SHA1

    95038623d23412a3f2a0b08d3ff0816022ba8cf6

    SHA256

    d5ea3898a3be8737db69917793012b390ee18e00bcb91d45c010f9ea7d276379

    SHA512

    412d1b94975713e3b1d0441a5022045dd3598dfb421d4a2345bef7fd76cb0f39850ba1c937f03ddca636f7ed075ecc00ae3c45046b3ff65b2e0d2a018ceea51f

  • C:\Users\Admin\AppData\Local\Temp\7zS5D6D.tmp\zWX3CbC7Ol7r1tC.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • C:\Users\Admin\AppData\Local\Temp\7zS5D6D.tmp\zWX3CbC7Ol7r1tC.exe
    Filesize

    760KB

    MD5

    dcd148f6f3af3e3b0935c4fcc9f41811

    SHA1

    ee9bdbc7c568c7832d90b85921ab20030b6734cd

    SHA256

    f8689641199c6fc430121797965485d95abfbc430753e0e668817ab3b511a1e4

    SHA512

    34be8e60dc2decf8287a71516f359e80bb858ce52218dde1b01c821c9b95be38821f068b79b0da8dbe90865560e7ddab77b25e3971dda9be667fb3ae8f174886

  • memory/3260-132-0x0000000000000000-mapping.dmp