Analysis
-
max time kernel
84s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2022 23:34
Static task
static1
Behavioral task
behavioral1
Sample
idman639build2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
idman639build2.exe
Resource
win10v2004-20221111-en
General
-
Target
idman639build2.exe
-
Size
10.1MB
-
MD5
32d11c996b67786686172b4179c6ee46
-
SHA1
d99662924b9d260872bba995b233332ee0eab748
-
SHA256
1d364c185082bf798f4ff21f33b63c84cc1407ca33be17793990190b59d2042c
-
SHA512
5dd02bf6a325befea5ce450b453376bee609b03df562fafdf6603b9e6c84e534e5d13b42aaacf0a99f0ffdc767d529c63fd073c6cf76e193f6268fb54ce8276b
-
SSDEEP
196608:Tsll5pqSg5rspViQUMWPNPFZYCpuUlI5H2rj8fBgnZxWdChHD2pe:TYTw5spVFtQPFZYjuISjmsZnKp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1120 IDM1.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1120 1168 idman639build2.exe 81 PID 1168 wrote to memory of 1120 1168 idman639build2.exe 81 PID 1168 wrote to memory of 1120 1168 idman639build2.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\idman639build2.exe"C:\Users\Admin\AppData\Local\Temp\idman639build2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp"C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"2⤵
- Executes dropped EXE
PID:1120
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD585ffda25e7f8584420496a45ff114eb5
SHA11ce8d2d592d1ca1509fb18a3d6cc8a251dc5c5f8
SHA256124701995b3aefba458dc4f654ff2e6c8df014e9ab210525edc031abf24c0491
SHA5125c07a29fc42e81a4591e8dbbea2a641b42a110bb31f4b6458794124246210af805bacd6949b95310038c5f19be392d33be081f2dce3946917e8972e00cc3fa90