Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2023 19:48
Static task
static1
Behavioral task
behavioral1
Sample
3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe
Resource
win10v2004-20230703-en
General
-
Target
3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe
-
Size
3.0MB
-
MD5
dc0691a0bc312adbd6cc87dc4a10c8dc
-
SHA1
86becab4de650ae9f6fbe2b11bdd40e1baed2118
-
SHA256
3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122
-
SHA512
da64d2a18b3f51b299b2124ea1331979811e978d8b9499b9309c428687f1ae2ba6fe1f7289f6987873e5ce61dd6791121b48bc87faa56ef12c896bc56bb5a14f
-
SSDEEP
98304:mQ21AK+uHKK+4QTFJ/E3L9v6RncHngSdQ0nf7:Vron+4QTFS3Jv6RcASW47
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 2644 3456 3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe 81 PID 3456 wrote to memory of 2644 3456 3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe 81 PID 3456 wrote to memory of 2644 3456 3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe"C:\Users\Admin\AppData\Local\Temp\3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\is-SP1TS.tmp\3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.tmp"C:\Users\Admin\AppData\Local\Temp\is-SP1TS.tmp\3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.tmp" /SL5="$500DC,2899903,51712,C:\Users\Admin\AppData\Local\Temp\3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.exe"2⤵
- Executes dropped EXE
PID:2644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\is-SP1TS.tmp\3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.tmp
Filesize706KB
MD51a6c2b578c69b9388e22d38afa16a7fb
SHA1186370d5438b1f5f3d75891aa8412e8edd00981c
SHA25686ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3
SHA512fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714
-
C:\Users\Admin\AppData\Local\Temp\is-SP1TS.tmp\3f5beb5467fbda992daeab6624613ce3873ae55f325aa8e536e603243bd3c122.tmp
Filesize706KB
MD51a6c2b578c69b9388e22d38afa16a7fb
SHA1186370d5438b1f5f3d75891aa8412e8edd00981c
SHA25686ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3
SHA512fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714