Analysis
-
max time kernel
69s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
gta san andreas jcres.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
gta san andreas jcres.exe
Resource
win10v2004-20220812-en
General
-
Target
gta san andreas jcres.exe
-
Size
5.5MB
-
MD5
69c3de7ef8db679bd3b078d7b0f1c264
-
SHA1
4060a0eefbe56f8030679eac07c1d431710379f1
-
SHA256
7ed7bd10fcac95af3e17c39e39340c8e96d47d16728f625489da06cc58afa945
-
SHA512
aea7fd6b926e01d96ca146a5e693d8fbd5d3fb67f499e4e81a07feb16469c5755a73d81151482a1e4b5728eb4774e712a1cc8256ee6a770174c1a85b7f485105
-
SSDEEP
98304:i4bL2BI4YLfYFwzLwgpfpu/LLJUqJodlZWb+J5YwXFrjoMoKtnq9kFPHWc:NbLYhYLPzEgDu/LJ69WqMKFbD6kFWc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
gta san andreas jcres.tmppid process 4704 gta san andreas jcres.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
gta san andreas jcres.exedescription pid process target process PID 4532 wrote to memory of 4704 4532 gta san andreas jcres.exe gta san andreas jcres.tmp PID 4532 wrote to memory of 4704 4532 gta san andreas jcres.exe gta san andreas jcres.tmp PID 4532 wrote to memory of 4704 4532 gta san andreas jcres.exe gta san andreas jcres.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\gta san andreas jcres.exe"C:\Users\Admin\AppData\Local\Temp\gta san andreas jcres.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-HS7C9.tmp\gta san andreas jcres.tmp"C:\Users\Admin\AppData\Local\Temp\is-HS7C9.tmp\gta san andreas jcres.tmp" /SL5="$B0052,5490190,49152,C:\Users\Admin\AppData\Local\Temp\gta san andreas jcres.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-HS7C9.tmp\gta san andreas jcres.tmpFilesize
682KB
MD5a546ecf8c27932aede6ce0fafce40aeb
SHA1687977a4fc93746f9d082f3e7d3903f99ec96396
SHA256346332efb594147d4c1ba043e97a424f6f63293896c8fadd64884ca1979a023a
SHA512b6edb91ee8070697ac371ad868f17843529f79b3d63b037d21771dd453dbb26778e4906b3a510e04d12d98c9d341dd1d9b1ffa88e761bb343783b23ccea2e2fa
-
C:\Users\Admin\AppData\Local\Temp\is-HS7C9.tmp\gta san andreas jcres.tmpFilesize
682KB
MD5a546ecf8c27932aede6ce0fafce40aeb
SHA1687977a4fc93746f9d082f3e7d3903f99ec96396
SHA256346332efb594147d4c1ba043e97a424f6f63293896c8fadd64884ca1979a023a
SHA512b6edb91ee8070697ac371ad868f17843529f79b3d63b037d21771dd453dbb26778e4906b3a510e04d12d98c9d341dd1d9b1ffa88e761bb343783b23ccea2e2fa
-
memory/4532-132-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/4532-136-0x0000000000400000-0x0000000000413000-memory.dmpFilesize
76KB
-
memory/4704-133-0x0000000000000000-mapping.dmp