Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2023, 08:27

General

  • Target

    idman641build15.exe

  • Size

    10.8MB

  • MD5

    868e7c026169d53150bdb41c70b57536

  • SHA1

    fbc55e53a0a135844528d138cf1211b75127a694

  • SHA256

    c70d80fe3c94371fb693572697cd8627452519d1855d23b1c680dc21b50b2059

  • SHA512

    f903a88b1b4935dc7bdf32de27b91d0c01cba8855b2e5315029840b5ea2e4b31a90c1439d5eab2bf5089f4346149574c7f2b5f5421313cf44e8cd1260d4f09ca

  • SSDEEP

    196608:oS65pjXv7e5lCLd1780TQWbNRqDiUYgjoLrPMf1NG6lZWxKIaQDD2peeF6:o1tXDo4LcfgRqmLgjCPCG8ZC/DKpb6

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\idman641build15.exe
    "C:\Users\Admin\AppData\Local\Temp\idman641build15.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp
      "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp" -d "C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\"
      2⤵
      • Executes dropped EXE
      PID:3372

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IDM_Setup_Temp\IDM1.tmp

    Filesize

    159KB

    MD5

    c1c19f153e707ab0d497f8ff1396afa3

    SHA1

    fe79022c82caaecc7e9988594b6d7206b1917f87

    SHA256

    ca03de5fe0dd2e86e188bc6ca36a57e2b281892c0bf1dc76ed4894c19d59ce5f

    SHA512

    96ec0fd4d41d753c90f279edfb1a0acb2f9a4d0c9653fc359ac3cde5c6bdd42528eac78f3c5cfea7bf97c0b83c1d178cd4bbdaa993740002f29cfcadb98b9ba2

  • memory/1632-133-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1632-136-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3372-135-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3372-137-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB