Analysis
-
max time kernel
112s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe
Resource
win10v2004-20220901-en
General
-
Target
636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe
-
Size
630KB
-
MD5
2f763781c1ea96568887ab0e1d1415e0
-
SHA1
66e5734432db8569c03a16cbdf9a0005dde85308
-
SHA256
636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3
-
SHA512
e5ac8e9542063bd6715622854cb652e9214ee4b4c787d0cde3a0de41dae102c2fb543c6f81a5c2d7a378e5acaf3637c680ea1854074a4bc33292dfc6a79060e0
-
SSDEEP
12288:mEtDt+QFAYvL7+3uhyMNfAsLfozPCOZ/5hNeGX9UZPTjOpMZaBY/x4b7GEtDt+Q:LTdvvdBfAXTBhqt4MZaB3rT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4312 ~DFA23D.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5060 wrote to memory of 4312 5060 636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe 81 PID 5060 wrote to memory of 4312 5060 636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe 81 PID 5060 wrote to memory of 4312 5060 636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe"C:\Users\Admin\AppData\Local\Temp\636410941b3b31c1f78a0b4ca2295148977903b34ba568d1dc33d3a88615aff3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\~DFA23D.tmpC:\Users\Admin\AppData\Local\Temp\~DFA23D.tmp OK2⤵
- Executes dropped EXE
PID:4312
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
633KB
MD5b6e8ced1b505bfc46c3eacbcb6441192
SHA1d4b7b424c61917791feb39660f735a200edaf64b
SHA256d19829f7b8608963754b53108fd7fac61c61453c43fe3774dbf96348a0d3978b
SHA512f7ef8bb9a9b0a291eaf608f5e3e407805542f9522c6736f8a83929ab02cbc06e245c1bec30ced7a917f7ee02d7401c378c35aa587d7f7721ae278c8b5d29e945
-
Filesize
633KB
MD5b6e8ced1b505bfc46c3eacbcb6441192
SHA1d4b7b424c61917791feb39660f735a200edaf64b
SHA256d19829f7b8608963754b53108fd7fac61c61453c43fe3774dbf96348a0d3978b
SHA512f7ef8bb9a9b0a291eaf608f5e3e407805542f9522c6736f8a83929ab02cbc06e245c1bec30ced7a917f7ee02d7401c378c35aa587d7f7721ae278c8b5d29e945