Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 09:46
Static task
static1
Behavioral task
behavioral1
Sample
cpu-z_2.04-cn.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cpu-z_2.04-cn.exe
Resource
win10v2004-20230220-en
General
-
Target
cpu-z_2.04-cn.exe
-
Size
2.1MB
-
MD5
c6991216bb74a500d66446f4b8f73f8f
-
SHA1
6a7cdaa8877cb4ecfde6a61621f647ee846cce8a
-
SHA256
57d8256a6c6a510470583bba4569269b7125e131c17dca0954c09261f4cae042
-
SHA512
562df759cc324e2cb25acbd856bbe0c61045909a45cede4bfa4a1b8a21e95c85440f987f5e3dcf9b165bf4175fa4ee89062a227ad8eb051f1df723f211b24ec3
-
SSDEEP
49152:SyhgH6UQ/t5Jr/zrkQDXFmmuEcXB3cgvBBTPcw0Lj11am:D+H6UQV5JrLFbFmmunXt3zETLj11Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
cpu-z_2.04-cn.tmppid process 4356 cpu-z_2.04-cn.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cpu-z_2.04-cn.exedescription pid process target process PID 620 wrote to memory of 4356 620 cpu-z_2.04-cn.exe cpu-z_2.04-cn.tmp PID 620 wrote to memory of 4356 620 cpu-z_2.04-cn.exe cpu-z_2.04-cn.tmp PID 620 wrote to memory of 4356 620 cpu-z_2.04-cn.exe cpu-z_2.04-cn.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\cpu-z_2.04-cn.exe"C:\Users\Admin\AppData\Local\Temp\cpu-z_2.04-cn.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-P9MUK.tmp\cpu-z_2.04-cn.tmp"C:\Users\Admin\AppData\Local\Temp\is-P9MUK.tmp\cpu-z_2.04-cn.tmp" /SL5="$A0044,1876818,58368,C:\Users\Admin\AppData\Local\Temp\cpu-z_2.04-cn.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-P9MUK.tmp\cpu-z_2.04-cn.tmpFilesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419
-
memory/620-133-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/620-140-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/4356-139-0x0000000000540000-0x0000000000541000-memory.dmpFilesize
4KB
-
memory/4356-141-0x0000000000400000-0x00000000004BF000-memory.dmpFilesize
764KB