Analysis

  • max time kernel
    293s
  • max time network
    269s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2023, 19:10

General

  • Target

    SoarInstaller.exe

  • Size

    53.7MB

  • MD5

    8030dfdd60ac90003d6c2c0440b19d0b

  • SHA1

    d22a1ed955d9cc2dd84461c7bb13d8161ac01132

  • SHA256

    22cd452ce01ecaa7860435431b718bfee3093efeece12783fab3a1810a1845b6

  • SHA512

    8ff6038abbaad823d944d1b14c69ba9ba36762724ddc8437d23c1b2cfb1144d12a397629e92f196f73ea3d62e5547249730889c3b082302ef97f389f0a6aeef7

  • SSDEEP

    1572864:fgnU6a9d7J/3+qbg9rRBc42yMGFiLMRUoihN:AajJfXbqRBc42yDiLqUow

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SoarInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\SoarInstaller.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\is-A7P67.tmp\SoarInstaller.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-A7P67.tmp\SoarInstaller.tmp" /SL5="$401CE,55414595,832512,C:\Users\Admin\AppData\Local\Temp\SoarInstaller.exe"
      2⤵
      • Executes dropped EXE
      PID:4064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-A7P67.tmp\SoarInstaller.tmp

    Filesize

    3.0MB

    MD5

    fa0cd3af13ba7ecc49c22b7a0932bdde

    SHA1

    d0e4662394b7e44011d27964438aec9bc9219660

    SHA256

    970ee2d1705d5ff2d834076ae416b7825d1ed67c85caf5e819003d41be577838

    SHA512

    6c2bf673d168c4d6a3f98e74ef831593b065f78b4b8a45eae9897184eb79dc7cbadc3efbd0dbd60467ac94a06ab62c1e72ea1bd151940ab9a8836906e6b4a483

  • memory/2316-134-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/2316-141-0x0000000000400000-0x00000000004D8000-memory.dmp

    Filesize

    864KB

  • memory/4064-139-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB

  • memory/4064-142-0x0000000000400000-0x000000000071B000-memory.dmp

    Filesize

    3.1MB

  • memory/4064-143-0x0000000002720000-0x0000000002721000-memory.dmp

    Filesize

    4KB