Analysis
-
max time kernel
91s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/12/2022, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
idman641build6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
idman641build6.exe
Resource
win10v2004-20220812-en
General
-
Target
idman641build6.exe
-
Size
10.8MB
-
MD5
ca5f2c20b23f553ede744031bcee9240
-
SHA1
e2bb2ef859f224bbc4dee9c09e4ffe6d40e89bab
-
SHA256
f13dff1c73d422e2119092af5c2764ad87e4374852d7e5691fdb448696f71f72
-
SHA512
08f0b6da1a083ca6da8027e07665ae1ec639eb0e28b4aef183501a8efc68591224a8c4f23311099a445f5362d01b69752e3ca2c6a6ee469c9ee3a433618f7d73
-
SSDEEP
196608:4sq5pwrR+j3J3p7CfaohovcWTNOPpSOU4FlK3rjofNx3edZi06H8yQ7D2pe6N:4vi4V3p7waoVgO17Ej03gZJH7KpN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5008 IDM1.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 5008 4528 idman641build6.exe 82 PID 4528 wrote to memory of 5008 4528 idman641build6.exe 82 PID 4528 wrote to memory of 5008 4528 idman641build6.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\idman641build6.exe"C:\Users\Admin\AppData\Local\Temp\idman641build6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"2⤵
- Executes dropped EXE
PID:5008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
167KB
MD54560be1f497974ca52528a52786c8f34
SHA114219c7e444fc2a8145f09cebea6886f02de0034
SHA256fc805d03f73c28aaee359811e046ff9fd39febbc80fc6bf01843d5fca9104a74
SHA512922277f1c4e766230c6723d899d6f1d3616096b1923c1751fb856a0083727c9d3d5f1e48db6db88182dd5643d6686c6ca91b212c001a9aa536d997f9355aae0e