Analysis
-
max time kernel
188s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 14:42
Static task
static1
Behavioral task
behavioral1
Sample
63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe
Resource
win10v2004-20220812-en
General
-
Target
63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe
-
Size
1.6MB
-
MD5
690ae4eff35b594c11388368b4a74897
-
SHA1
a8d9eb9995104592b7bb48e152cb6e17ea3721ab
-
SHA256
63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5
-
SHA512
6abe468023bce66f35d9ee00c2d35ddebdad8bcfe99f8ae42471a720f217ac3da94d63e5aec02a1b007c84845af117e3bf3e6a98e27f3f45bcceb6292362962f
-
SSDEEP
24576:Bna7zTLnEQOs72LvLa8O/0mc58JmdmyAExUXUP/aNV0MG9vq89EtEtbOC7dTBY/S:Ba7bEQLofFtP/aNqTq8itAyKZTptZ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4436 63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4436 1672 63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe 78 PID 1672 wrote to memory of 4436 1672 63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe 78 PID 1672 wrote to memory of 4436 1672 63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe"C:\Users\Admin\AppData\Local\Temp\63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\is-L4R38.tmp\63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.tmp"C:\Users\Admin\AppData\Local\Temp\is-L4R38.tmp\63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.tmp" /SL5="$80032,1348303,151552,C:\Users\Admin\AppData\Local\Temp\63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.exe"2⤵
- Executes dropped EXE
PID:4436
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-L4R38.tmp\63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.tmp
Filesize783KB
MD5c0e6d7cd82fd932436ab2af197ca9af0
SHA17740a420c640c26800b4c0e9c9fd736925b16afc
SHA256e6b331eaf1ffa4d8d48239ffcc9db17714c0cd686ce358ad9ee2bd07d10f2b3f
SHA5126c698a193ddcbcc59674dc8caaa19c1b438aee04c3a1d22357d4ec20d3f3c942a20b878bfc20903af3163ca70dd2ea8922625ff105b2828f88877282e037ad1f
-
C:\Users\Admin\AppData\Local\Temp\is-L4R38.tmp\63fc803c4bd4b79b3034ca4f4f578fa9fe2811cd6407da781df5f6feb776c8d5.tmp
Filesize783KB
MD5c0e6d7cd82fd932436ab2af197ca9af0
SHA17740a420c640c26800b4c0e9c9fd736925b16afc
SHA256e6b331eaf1ffa4d8d48239ffcc9db17714c0cd686ce358ad9ee2bd07d10f2b3f
SHA5126c698a193ddcbcc59674dc8caaa19c1b438aee04c3a1d22357d4ec20d3f3c942a20b878bfc20903af3163ca70dd2ea8922625ff105b2828f88877282e037ad1f