Analysis

  • max time kernel
    327s
  • max time network
    346s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 17:24

General

  • Target

    ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe

  • Size

    96KB

  • MD5

    7e49975e4ec394b7d8b47e8882ec958d

  • SHA1

    3400efe3544264eba8bdb7eb5d77396639ad1067

  • SHA256

    ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b

  • SHA512

    e7fe122f7a2c816c17e722aa117cef5d041c985a8be23dd05a7450c030c9743ced1d060de05b83e5f112dde08a4689bb777432bd0fb18ae7a7242eefabe49408

  • SSDEEP

    1536:CMFusSx9qYMhdFHS8qdydo3nTzhYxJA+CwNUtBZVY9v8prRmw2tRs/yR:CeS4jHS8q/3nTzePCwNUh4E9Rmw2QyR

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe
    "C:\Users\Admin\AppData\Local\Temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3912
    • \??\c:\users\admin\appdata\local\hwsubgqnoj
      "C:\Users\Admin\AppData\Local\Temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe" a -sc:\users\admin\appdata\local\temp\ce7be5779266eb006ca1f78bda4637d8912688b6549e5464e91d4841fcfb537b.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:4932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\hwsubgqnoj

    Filesize

    10.9MB

    MD5

    2ba49cd1e3f8298c31e75aab2111e1c4

    SHA1

    db00d22166ac678cbf81b4cc517dcf5395c420a8

    SHA256

    546ce0f3fdc4d8bf6d5e67f3b0632915a62ecde67439bf8ca13639195e2729fb

    SHA512

    e5a02f0263f62f7cfdd64c7dd08d774ab1de131e06ce0688599e801b456ff4441579e035e210d16b13a271025fcae58980f03bfa18e04d84b97ddc1aa424b17c

  • \??\c:\users\admin\appdata\local\hwsubgqnoj

    Filesize

    10.9MB

    MD5

    2ba49cd1e3f8298c31e75aab2111e1c4

    SHA1

    db00d22166ac678cbf81b4cc517dcf5395c420a8

    SHA256

    546ce0f3fdc4d8bf6d5e67f3b0632915a62ecde67439bf8ca13639195e2729fb

    SHA512

    e5a02f0263f62f7cfdd64c7dd08d774ab1de131e06ce0688599e801b456ff4441579e035e210d16b13a271025fcae58980f03bfa18e04d84b97ddc1aa424b17c

  • memory/3912-132-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB

  • memory/3912-133-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB

  • memory/4932-137-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB

  • memory/4932-138-0x0000000000400000-0x000000000044E34C-memory.dmp

    Filesize

    312KB