Analysis

  • max time kernel
    105s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2023 09:20

General

  • Target

    aTube_Catcher_FREE_9991.exe

  • Size

    24.1MB

  • MD5

    eec82d625010a7a177035dc6d7540824

  • SHA1

    3ff6ef5202a0b2d35d7509f703e3ae6d79305acd

  • SHA256

    61c11fd68de2448e1c396b811052766d4dbaf1812079b0b5278478eda367efb0

  • SHA512

    0ceabe9034c87149148d47e5302a1ee2a33b0739c897d6c51a7ea865db7fdbcf23ce0599f7155820a92948f7522e2c4a7acff0a9b4e7fe48d4e0eeeda427ef94

  • SSDEEP

    393216:AdrXnY1guAEElI9BUfibFyqpYCD8apON5AtWPm/v7xltQ/UiZdmuSngSLcGKrRi:iygx4UypVxpQAtKmHrtPBnRLcGKrRi

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aTube_Catcher_FREE_9991.exe
    "C:\Users\Admin\AppData\Local\Temp\aTube_Catcher_FREE_9991.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\is-E6EUO.tmp\aTube_Catcher_FREE_9991.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-E6EUO.tmp\aTube_Catcher_FREE_9991.tmp" /SL5="$90040,24704281,141824,C:\Users\Admin\AppData\Local\Temp\aTube_Catcher_FREE_9991.exe"
      2⤵
      • Executes dropped EXE
      PID:4416

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-E6EUO.tmp\aTube_Catcher_FREE_9991.tmp
    Filesize

    1.2MB

    MD5

    db1676059e94b886c062a4fe2ed6e194

    SHA1

    2d6fd279c1eea4438638aab11bc286aea3b8aaba

    SHA256

    955a7b3d2a8416084550ff6f8918c148b071613ff9391fd6be6f9e7b5f2acf1a

    SHA512

    0cbbac993100f1c4cd022e4fe5d2eb50ae7a5eb3afcc2dcb984252029f04b0d05f549b999603cce3acd7a234b51d5f1c8a49bdd425f1e635c1c1c9450ca5e205

  • memory/4416-134-0x0000000000000000-mapping.dmp
  • memory/4508-132-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/4508-136-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB