Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe
Resource
win10v2004-20221111-en
General
-
Target
2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe
-
Size
10.9MB
-
MD5
60eb59acb5034c71e03f65f514e2076c
-
SHA1
36b9ba2d453167bed92f26d6f894a3ebfdc3acab
-
SHA256
2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b
-
SHA512
f9dc595e0cfa5a52b114a127e66b19ce0dd39a986fe6cccfe84f10d924efc0849aedc421ea332c4e65c5c57bf499a604ceb2de082afc803d57a025ba5e2043c5
-
SSDEEP
196608:utPSFOd70TWIac803w/AbPcmJf0+v1slEiCuWaLlqgBm0bsqZYLN8BUtBc+3uNz1:u4FOdA8y1PcO2lERIqgBc7NEUtBqNd7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5088 2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.tmp -
Loads dropped DLL 2 IoCs
pid Process 5088 2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.tmp 5088 2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 5088 4464 2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe 84 PID 4464 wrote to memory of 5088 4464 2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe 84 PID 4464 wrote to memory of 5088 4464 2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe"C:\Users\Admin\AppData\Local\Temp\2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\is-B3DV6.tmp\2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.tmp"C:\Users\Admin\AppData\Local\Temp\is-B3DV6.tmp\2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.tmp" /SL5="$80066,11004225,114176,C:\Users\Admin\AppData\Local\Temp\2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
C:\Users\Admin\AppData\Local\Temp\is-B3DV6.tmp\2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.tmp
Filesize1.1MB
MD54b6d752df7add5d5e17f6bfd9c21ee4c
SHA1064b201a03ce836248e0c3b25064389d6ceb36f3
SHA256e314bea833e7b27c4ce59e212add98da81bc1a56b795089133530289a915583a
SHA512dd188de2ce9a4b6bbbeaffe02f00ffdf381389d409b3fe532db3a710dd307edbdef3c1e7a3702909957481e68df965726fb317f5fc7e2ddb08d647654e672e51
-
C:\Users\Admin\AppData\Local\Temp\is-B3DV6.tmp\2275160d75658d194a99bcae9fdaaefb7a512932e0e09c3266aa4655432edc9b.tmp
Filesize1.1MB
MD54b6d752df7add5d5e17f6bfd9c21ee4c
SHA1064b201a03ce836248e0c3b25064389d6ceb36f3
SHA256e314bea833e7b27c4ce59e212add98da81bc1a56b795089133530289a915583a
SHA512dd188de2ce9a4b6bbbeaffe02f00ffdf381389d409b3fe532db3a710dd307edbdef3c1e7a3702909957481e68df965726fb317f5fc7e2ddb08d647654e672e51