Analysis

  • max time kernel
    16s
  • max time network
    18s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2023, 21:30

General

  • Target

    015da449e195a4f97fac7a3be18a9c47.exe

  • Size

    604KB

  • MD5

    015da449e195a4f97fac7a3be18a9c47

  • SHA1

    4a46d5d54aa9d8c335816713ba9ee938c9ad5bb8

  • SHA256

    4a583b21b4ae3ca34bcde7f773e3ca5d98ed28e18f80c1e316d2958357f4eced

  • SHA512

    0d74c3d024467ca2ac83982e3bed5a8292b2767a019437b9f415eb402ebb7886a6242e69168e54b6d241b41accde7c5c501d6d030cc3c86c6862430700cbde29

  • SSDEEP

    6144:VdtNyPCDTb+HdtH9Wd1yxBMf9eHCDm2ctWDwK3bLqpnobns+NOYup6GCH8jyh0XL:VSCj+Hdsy7MfgHUctW3XHnQ6GCcjq0XL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\015da449e195a4f97fac7a3be18a9c47.exe
    "C:\Users\Admin\AppData\Local\Temp\015da449e195a4f97fac7a3be18a9c47.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c embedded.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Users\Admin\AppData\Local\Temp\embedded.exe
        embedded.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          4⤵
            PID:4008
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 416
              5⤵
              • Program crash
              PID:2152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4008 -ip 4008
      1⤵
        PID:1884

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\embedded.exe

              Filesize

              66KB

              MD5

              140d24af0c2b3a18529df12dfbc5f6de

              SHA1

              e8db5ad2b7ffede3e41b9c3adb24f3232d764931

              SHA256

              4eabb1adc035f035e010c0d0d259c683e18193f509946652ed8aa7c5d92b6a92

              SHA512

              a2ead649f155555ec3e55800494f833d18cea68afe736807ec23b5991242928a0853e451b60894ec8e0abe8c42db341c2237007981f38f0366fd7c6ecafb7415

            • C:\Users\Admin\AppData\Local\Temp\embedded.exe

              Filesize

              66KB

              MD5

              140d24af0c2b3a18529df12dfbc5f6de

              SHA1

              e8db5ad2b7ffede3e41b9c3adb24f3232d764931

              SHA256

              4eabb1adc035f035e010c0d0d259c683e18193f509946652ed8aa7c5d92b6a92

              SHA512

              a2ead649f155555ec3e55800494f833d18cea68afe736807ec23b5991242928a0853e451b60894ec8e0abe8c42db341c2237007981f38f0366fd7c6ecafb7415

            • memory/2188-138-0x0000000000780000-0x00000000007FC000-memory.dmp

              Filesize

              496KB

            • memory/4728-137-0x0000000000400000-0x0000000000414000-memory.dmp

              Filesize

              80KB