Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2023 06:32

General

  • Target

    f905g80f.exe

  • Size

    52.9MB

  • MD5

    17c87cb308128a84ab4e6ceea817c202

  • SHA1

    b3fb015f665038fe2024c84871325848bc6e646c

  • SHA256

    d0121794d3c17b5dc6daad721e994d74ef804f08a777ec78715cb5fd82c3d3ef

  • SHA512

    c3ebb95f7d5841c3139dd7c48f6b790c6cbd0bfff9a9dc0453e96863b461a2d74f2d1482a4e2fd9542cf442f39ef64efc447c6b91b9247d9a2328a48a7f92c8a

  • SSDEEP

    1572864:D7dUEh69iy9ClaiHbKeqIdlC2D+3EwvQA:OB97BEJdlCv3EwV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f905g80f.exe
    "C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4544
    • C:\Users\Admin\AppData\Local\Temp\is-4Q634.tmp\f905g80f.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4Q634.tmp\f905g80f.tmp" /SL5="$110068,55051259,114176,C:\Users\Admin\AppData\Local\Temp\f905g80f.exe"
      2⤵
      • Executes dropped EXE
      PID:504

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-4Q634.tmp\f905g80f.tmp

    Filesize

    1.1MB

    MD5

    f120c361b527a9d090782300aa8f1ce5

    SHA1

    ed82441da0dc7a5695ef96839fc2aea0f0c7e376

    SHA256

    9209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825

    SHA512

    60fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555

  • C:\Users\Admin\AppData\Local\Temp\is-4Q634.tmp\f905g80f.tmp

    Filesize

    1.1MB

    MD5

    f120c361b527a9d090782300aa8f1ce5

    SHA1

    ed82441da0dc7a5695ef96839fc2aea0f0c7e376

    SHA256

    9209a83ac4b0127081327b6e03960e2a4325dbb31f0bba2b56dfb785583f9825

    SHA512

    60fc418c4296f67b923e1fff4e6034ed41eeba61604b14d560cfd84e7476b59311c6029aee7ee602d8fdc635107855e5c05dcf6a0137c6ba89db7134e63e5555

  • memory/504-7-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/504-13-0x0000000000400000-0x0000000000529000-memory.dmp

    Filesize

    1.2MB

  • memory/504-14-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/4544-1-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/4544-12-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB