Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2023, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
SetupImage.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
SetupImage.exe
Resource
win10v2004-20230703-en
General
-
Target
SetupImage.exe
-
Size
1.4MB
-
MD5
9e63cafd950aef3aac9210b48fbcab3d
-
SHA1
f98ca96c09da31b83473f153453dcd793a173ee2
-
SHA256
f53cccec8c648ac97c5537e8b757c1dbc38297b32a21a1527b0ff18f07dfbc7c
-
SHA512
fc4d3d1a57d27c207da8ef055de8ba06a22a676c78c3db639a4486c626ac35aa483f2c9ef0ddd0423a7818304c62dd704e099e0ad7cbf6d9dd6a026e5c090473
-
SSDEEP
24576:CxGlZeVswK8mha5itUcdC2ciBGvf4wsdQRrs0iQzO5GXNwBVLj9o6k1vh/BZS0hU:nrXFHtvdCgoAwsdQRr1iQAH/fmDJo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1568 SetupImage.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3744 wrote to memory of 1568 3744 SetupImage.exe 84 PID 3744 wrote to memory of 1568 3744 SetupImage.exe 84 PID 3744 wrote to memory of 1568 3744 SetupImage.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\SetupImage.exe"C:\Users\Admin\AppData\Local\Temp\SetupImage.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\is-9T4H1.tmp\SetupImage.tmp"C:\Users\Admin\AppData\Local\Temp\is-9T4H1.tmp\SetupImage.tmp" /SL5="$D0064,1053247,119296,C:\Users\Admin\AppData\Local\Temp\SetupImage.exe"2⤵
- Executes dropped EXE
PID:1568
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56a96bef4679e16a54b4090e74664dcca
SHA1c8631c1624b98f6709b1ac37ce3956faed29bc30
SHA256cb095356ddcfcbace96c6252fb73a267ed011c15ff206a7a9302007baa68a783
SHA512924ab1e5c6ea72342eab6e78899a56c415e90020c46d3d8a81ae4da9276db7ea1df9684965a81fb95a6f2f9cf103b31413d67770eb15725ad04198c5d00037d0