Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2023 18:14

General

  • Target

    uiso9_cn.exe

  • Size

    2.2MB

  • MD5

    539902c3cd4071c5603ab30403494b9e

  • SHA1

    b1c4a7f45a725907493543dd1dcfcb430375c001

  • SHA256

    c6fda54203f309cbe8b49584a5cb5b24ca09392b9f96191d0177221a639dc77b

  • SHA512

    78611185f54fa7395b033bb4e7d0a91ca07059f39745efc5481fb5bb42ecf1872e7f4da7dab2f2c5d6f5ac369f1d842ff6c13704ce943684b0f70367067084ce

  • SSDEEP

    49152:E9Fj+J6gI88iliT0IHdtndpzgcVYI6MBtPId/CwxKEDGz3MwH:OFjm6YlG9tnMcOsQdawxez3LH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\uiso9_cn.exe
    "C:\Users\Admin\AppData\Local\Temp\uiso9_cn.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\is-BPJEU.tmp\uiso9_cn.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-BPJEU.tmp\uiso9_cn.tmp" /SL5="$90054,2002741,126976,C:\Users\Admin\AppData\Local\Temp\uiso9_cn.exe"
      2⤵
      • Executes dropped EXE
      PID:1352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-BPJEU.tmp\uiso9_cn.tmp

    Filesize

    760KB

    MD5

    f3c51febb3246b0bd7d5419a311331a0

    SHA1

    9f7113ef177036125ef668f718068fe60796042c

    SHA256

    bf045aaac353b715a77c54b6c145b038939053651313d7ef1e608674c7519d9a

    SHA512

    c7c1e6fab254a3b462d4c0bad2d700afc9d6bcbe2a4cff01531f937429ca5d3b56dd9c613bc978474abbc2be92e075f15c6c3cf999d899ea14e3595ea033d006

  • C:\Users\Admin\AppData\Local\Temp\is-BPJEU.tmp\uiso9_cn.tmp

    Filesize

    760KB

    MD5

    f3c51febb3246b0bd7d5419a311331a0

    SHA1

    9f7113ef177036125ef668f718068fe60796042c

    SHA256

    bf045aaac353b715a77c54b6c145b038939053651313d7ef1e608674c7519d9a

    SHA512

    c7c1e6fab254a3b462d4c0bad2d700afc9d6bcbe2a4cff01531f937429ca5d3b56dd9c613bc978474abbc2be92e075f15c6c3cf999d899ea14e3595ea033d006

  • memory/1352-143-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/1352-145-0x0000000000400000-0x00000000004CE000-memory.dmp

    Filesize

    824KB

  • memory/2484-133-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/2484-144-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB