Analysis

  • max time kernel
    200s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 21:47

General

  • Target

    edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.exe

  • Size

    13.1MB

  • MD5

    f898d837e97600d154827b67bf78f2cf

  • SHA1

    9bd9f04be45870c869607627984b2ea156301120

  • SHA256

    edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec

  • SHA512

    1ba42595f7fe32f054af9382f4b2f393918776fea298a69906e5912f9bb6ccd4504930e0f41bc152814365a786a25b041b308fab131e314756dfd300df8cd889

  • SSDEEP

    393216:unIIZ2qFtTMff0h9HrQ5G3DGI5ChaI9R8xk:uf2qFtTmf0hNQ5rI5b1k

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.exe
    "C:\Users\Admin\AppData\Local\Temp\edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Users\Admin\AppData\Local\Temp\is-F8F96.tmp\edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-F8F96.tmp\edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.tmp" /SL5="$90046,13480716,56832,C:\Users\Admin\AppData\Local\Temp\edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.exe"
      2⤵
      • Executes dropped EXE
      PID:4900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-F8F96.tmp\edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.tmp

    Filesize

    690KB

    MD5

    a2c4d52c66b4b399facadb8cc8386745

    SHA1

    c326304c56a52a3e5bfbdce2fef54604a0c653e0

    SHA256

    6c0465ce64c07e729c399a338705941d77727c7d089430957df3e91a416e9d2a

    SHA512

    2a66256ff8535e2b300aa0ca27b76e85d42422b0aaf5e7e6d055f7abb9e338929c979e185c6be8918d920fb134b7f28a76b714579cacb8ace09000c046dd34d6

  • C:\Users\Admin\AppData\Local\Temp\is-F8F96.tmp\edb9bec0de50ae322de1c6cd036a4fff0a5400923389f07662f5a9ff2da531ec.tmp

    Filesize

    690KB

    MD5

    a2c4d52c66b4b399facadb8cc8386745

    SHA1

    c326304c56a52a3e5bfbdce2fef54604a0c653e0

    SHA256

    6c0465ce64c07e729c399a338705941d77727c7d089430957df3e91a416e9d2a

    SHA512

    2a66256ff8535e2b300aa0ca27b76e85d42422b0aaf5e7e6d055f7abb9e338929c979e185c6be8918d920fb134b7f28a76b714579cacb8ace09000c046dd34d6

  • memory/4464-132-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4464-134-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/4464-138-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB