Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 08:15
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230703-en
General
-
Target
setup.exe
-
Size
3.6MB
-
MD5
002247f32f0e872ff49e942af8c03456
-
SHA1
7feb5b75364a96cafb33055366ea326277332383
-
SHA256
20739f8c131cffdedb5405d6c5be6c4bc6ad6b81a8ddecfa77589cf376ddb555
-
SHA512
2eff240f26edafbe79c561a64aeee49da777073918cef7f98d25b6768718dc6f8c710ee493c0083e5d028f7b39f750c98eb61ff0b3576f066b364c02d18f351c
-
SSDEEP
98304:Z9u3lllb+hb1oFj6seR8NrRV4DP5tj6RRTrLs+MsfUXAaIJ/iOp1X:4FaCdva8NtgRtj6Rq1KKOpB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3656 setup.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3656 4908 setup.exe 84 PID 4908 wrote to memory of 3656 4908 setup.exe 84 PID 4908 wrote to memory of 3656 4908 setup.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\is-BCT9R.tmp\setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-BCT9R.tmp\setup.tmp" /SL5="$A0152,3566837,58368,C:\Users\Admin\AppData\Local\Temp\setup.exe"2⤵
- Executes dropped EXE
PID:3656
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
702KB
MD51afbd25db5c9a90fe05309f7c4fbcf09
SHA1baf330b5c249ca925b4ea19a52fe8b2c27e547fa
SHA2563bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c
SHA5123a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419