Analysis
-
max time kernel
177s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
31-03-2023 16:56
Static task
static1
Behavioral task
behavioral1
Sample
.............exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
.............exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
your-file_iFMs6qyg.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
your-file_iFMs6qyg.exe
Resource
win10v2004-20230220-en
General
-
Target
.............exe
-
Size
5.8MB
-
MD5
288d7d66024b6562feeb4d6baed41849
-
SHA1
cb9efb823a462d1afc8057839fecd224d661102a
-
SHA256
7dfffd124e41f73e266f806951457060dfff9950caca0fcd1c542ff5e9a21e34
-
SHA512
1793b4c153f4277d65cf99b2758c586f4a59234760916280deab35ae69bd48b3584ba76474243ac67efb98c052b4e9a184c16b93b10ea92292eac46224cf334a
-
SSDEEP
98304:LX44Xe8aIUM7LhfXMObVARKlsZjLusEBHYCzg1OnW/T+1zS2owMVMowF:7VXeNIUuWObuRKIu5Y0CozSnw7bF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
.............tmppid process 1828 .............tmp -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
.............exedescription pid process target process PID 4092 wrote to memory of 1828 4092 .............exe .............tmp PID 4092 wrote to memory of 1828 4092 .............exe .............tmp PID 4092 wrote to memory of 1828 4092 .............exe .............tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\.............exe"C:\Users\Admin\AppData\Local\Temp\.............exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\is-EP0K6.tmp\.............tmp"C:\Users\Admin\AppData\Local\Temp\is-EP0K6.tmp\.............tmp" /SL5="$B007C,5307485,798208,C:\Users\Admin\AppData\Local\Temp\.............exe"2⤵
- Executes dropped EXE
PID:1828
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5dc270b2fae059b51845179bb688518d2
SHA1c4cb4f277b13ef18af9f805c2c907e76bfbf4090
SHA256193eeaaea6e82956e8e09fbde518b5b008edcda24da40b13bc4a751a21bfeb7f
SHA512efdc817a697a7f0e5c512e94ff0a900ca2f65b91f54e256e15d0b2e4797368b2c685d12abd6e74ca2e09ea6dd3c1603783c205d7b9a9d865ec9ed7dbd27283c2