Resubmissions

12/01/2023, 21:43 UTC

230112-1k14vsbc62 1

12/01/2023, 21:26 UTC

230112-z95mxaeg2s 1

Analysis

  • max time kernel
    597s
  • max time network
    428s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/01/2023, 21:43 UTC

General

  • Target

    onlinedrive.exe

  • Size

    377KB

  • MD5

    cf16b73c4bc8b0b3169def3145515c51

  • SHA1

    d96122f40c613ec7569b0afa431670827b2b20f2

  • SHA256

    8b9242cdae9f1f916e026e7e09620a4f1cfd702caad9312dcd8c60c7921ed30d

  • SHA512

    b09080e5afd57afcbd78dde9ef707f7afb74afd04515d800b5e2e0f7832755131a1c1b7a1f32383e569c9945ffd7b73f9b4c44d9c3894e78093a3cb751310c8f

  • SSDEEP

    6144:RZzN/DXrMBfOxw4do6fmdrb3JjvYF0loyZ:RZ1r4szdogmBRvYF0loyZ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\onlinedrive.exe
    "C:\Users\Admin\AppData\Local\Temp\onlinedrive.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SYSTEM32\cmd.exe
      cmd
      2⤵
        PID:3816
      • C:\Windows\SYSTEM32\cmd.exe
        cmd
        2⤵
          PID:4372
        • C:\Windows\SYSTEM32\cmd.exe
          cmd
          2⤵
            PID:360
          • C:\Windows\SYSTEM32\cmd.exe
            cmd
            2⤵
              PID:4756
            • C:\Windows\SYSTEM32\cmd.exe
              cmd
              2⤵
                PID:4808
              • C:\Windows\SYSTEM32\cmd.exe
                cmd
                2⤵
                  PID:4840
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd
                  2⤵
                    PID:2324
                  • C:\Windows\SYSTEM32\cmd.exe
                    cmd
                    2⤵
                      PID:4272
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd
                      2⤵
                        PID:3676
                      • C:\Windows\SYSTEM32\cmd.exe
                        cmd
                        2⤵
                          PID:4992
                        • C:\Windows\SYSTEM32\cmd.exe
                          cmd
                          2⤵
                            PID:3380
                          • C:\Windows\SYSTEM32\cmd.exe
                            cmd
                            2⤵
                              PID:4344
                            • C:\Windows\SYSTEM32\cmd.exe
                              cmd
                              2⤵
                                PID:4876
                              • C:\Windows\SYSTEM32\cmd.exe
                                cmd
                                2⤵
                                  PID:4416
                                • C:\Windows\SYSTEM32\cmd.exe
                                  cmd
                                  2⤵
                                    PID:4772
                                  • C:\Windows\SYSTEM32\cmd.exe
                                    cmd
                                    2⤵
                                      PID:1872
                                    • C:\Windows\SYSTEM32\cmd.exe
                                      cmd
                                      2⤵
                                        PID:4960
                                      • C:\Windows\SYSTEM32\cmd.exe
                                        cmd
                                        2⤵
                                          PID:3968
                                        • C:\Windows\SYSTEM32\cmd.exe
                                          cmd
                                          2⤵
                                            PID:3936
                                          • C:\Windows\SYSTEM32\cmd.exe
                                            cmd
                                            2⤵
                                              PID:4320
                                            • C:\Windows\SYSTEM32\cmd.exe
                                              cmd
                                              2⤵
                                                PID:4304
                                              • C:\Windows\SYSTEM32\cmd.exe
                                                cmd
                                                2⤵
                                                  PID:3204
                                                • C:\Windows\SYSTEM32\cmd.exe
                                                  cmd
                                                  2⤵
                                                    PID:4292
                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                    cmd
                                                    2⤵
                                                      PID:2164
                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                      cmd
                                                      2⤵
                                                        PID:5036

                                                    Network

                                                      No results found
                                                    • 51.105.71.137:443
                                                      322 B
                                                      7
                                                    • 93.184.221.240:80
                                                      322 B
                                                      7
                                                    No results found

                                                    MITRE ATT&CK Matrix

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    We care about your privacy.

                                                    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.