Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/12/2022, 02:05

General

  • Target

    21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.exe

  • Size

    1.5MB

  • MD5

    37031a42d4a0013f84161762d8f68134

  • SHA1

    fb52f6dbbab0fae2f3f5b01da88a9bba4de9fd22

  • SHA256

    21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75

  • SHA512

    413ad06fa6c69a17dfb829d8e56c2b97caed7022cfd1d659392d931031b5d49474028dd6b3292fc7d78d005bb1a9ae98c6b7703d0b8d76a09cc5e9ff477d4fc3

  • SSDEEP

    24576:9eN4XbhGfAQvWCp4q4Hg7wdltaO0UL3lBcHLcBmEFpLMwdJLKcNKNWOVq76w:70fAQvtp4qN7hULjQLKmuAwddP4y7T

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.exe
    "C:\Users\Admin\AppData\Local\Temp\21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\is-M59Q2.tmp\21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-M59Q2.tmp\21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.tmp" /SL5="$E01D6,1320618,56832,C:\Users\Admin\AppData\Local\Temp\21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.exe"
      2⤵
      • Executes dropped EXE
      PID:4844

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-M59Q2.tmp\21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.tmp

          Filesize

          702KB

          MD5

          e470dc0989b8713ea215450228e0c714

          SHA1

          f2df3fd29919421a9f55f471d9fa70aea3751f59

          SHA256

          838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635

          SHA512

          822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7

        • C:\Users\Admin\AppData\Local\Temp\is-M59Q2.tmp\21be2ea6b642ae65eeee59f216958ddaecaf2a119d2107a68fa5bd1dc36f8c75.tmp

          Filesize

          702KB

          MD5

          e470dc0989b8713ea215450228e0c714

          SHA1

          f2df3fd29919421a9f55f471d9fa70aea3751f59

          SHA256

          838cb7d51005265c61f14d9f22281903a8bd8b0bac134b9ee0cb42dcbe7d0635

          SHA512

          822ee38368a105dcd61675901aca48d0c22b5e6de45da9959322367fa41638ca792d1e8beefe226a0e5eb8bb916eb2409b76aad17f030bc7d62d4844ef06ada7

        • memory/1688-132-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1688-134-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/1688-138-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB