Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
53eea8664d54198e1989301b12f795da.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
53eea8664d54198e1989301b12f795da.exe
Resource
win10v2004-20230703-en
General
-
Target
53eea8664d54198e1989301b12f795da.exe
-
Size
112.3MB
-
MD5
53eea8664d54198e1989301b12f795da
-
SHA1
00bddca8bba387a76d6f18fc942859acf9ff5a60
-
SHA256
a7c997ba3c3e91c048f80f96f08754948428f6d3fe4001bab79c4ae09d06c5e0
-
SHA512
e05bd2e369b19b818f715a14ceb2c35b2f8409e5524d347d3093ef82667675bf719af17ab77412156aa62748aa17572d622b163bb6d187d917282f49e56ff831
-
SSDEEP
3145728:kNS0yY1k/bQS8yJQZI3XeKBPKi2O3hE4AGzUVeQgnFV:koqcQ+3XHD2OxEfPQQgnFV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4004 53eea8664d54198e1989301b12f795da.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5080 wrote to memory of 4004 5080 53eea8664d54198e1989301b12f795da.exe 86 PID 5080 wrote to memory of 4004 5080 53eea8664d54198e1989301b12f795da.exe 86 PID 5080 wrote to memory of 4004 5080 53eea8664d54198e1989301b12f795da.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\53eea8664d54198e1989301b12f795da.exe"C:\Users\Admin\AppData\Local\Temp\53eea8664d54198e1989301b12f795da.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\is-SO9PU.tmp\53eea8664d54198e1989301b12f795da.tmp"C:\Users\Admin\AppData\Local\Temp\is-SO9PU.tmp\53eea8664d54198e1989301b12f795da.tmp" /SL5="$5011C,115841256,1202688,C:\Users\Admin\AppData\Local\Temp\53eea8664d54198e1989301b12f795da.exe"2⤵
- Executes dropped EXE
PID:4004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.4MB
MD507b96c2d1823a0a548832c1062799d85
SHA165a35826b0e6d93700256fd8a4710cc039bd7b8d
SHA256c5ba29e4c82fca9adfcd3a6b60b3bf786abe7178928f80cb60eca3564e35b3de
SHA512abf2ba63976bd6622f3a1cda816c8f2267b59c079d6092ff60e7f52be893a993e3b457a174092c74056628e9694fa9efc8d823d14b4d658a9eb59c622d992f65