Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-10-2023 05:09

General

  • Target

    9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe

  • Size

    5KB

  • MD5

    aaf4496f8347a21a513535450d84ce18

  • SHA1

    f18c68d4582d17bc1c6a8a0a931d6340b732d30d

  • SHA256

    9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429

  • SHA512

    e59c8512918f9f3b6f42b79d7e3dc0066592c5240dbf7f848e3bb4fbb152772aaaa5c2cc83750d19589a8c8c3237716e88c682dadce0a63dc968767a9391ce39

  • SSDEEP

    96:89tHlXIDqHP/gKm0VleLu1AOyddoTrQDzBJSJ0orSm:olXjnHmiWuaOgIaorF

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe
    "C:\Users\Admin\AppData\Local\Temp\9d08566a18af866dff7961efb0cad5920d1ddf4266417807e0312aff732e6429.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:64
      • C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe
        C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4548
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5024
          • C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe
            C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4660
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2468
              • C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe
                C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe
                7⤵
                • Executes dropped EXE
                PID:912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe

    Filesize

    5KB

    MD5

    49ccfaf492138c0e18c51958b0b6fb32

    SHA1

    4613a67cd96038e4a572bc233a5fa854d549f0d0

    SHA256

    bd905c26eb5ccee01f113d22cc0614369b26c377bfdce9e230335a8a4d9af402

    SHA512

    f935e3cd27a5fb3f7900b499ea86d093c37e39ac57a8ea8a13e6cacb4a10fbf001d8bfe1499b0ccbf03fb519eb08296b7dac712dab4431442a9857792b519861

  • C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe

    Filesize

    5KB

    MD5

    49ccfaf492138c0e18c51958b0b6fb32

    SHA1

    4613a67cd96038e4a572bc233a5fa854d549f0d0

    SHA256

    bd905c26eb5ccee01f113d22cc0614369b26c377bfdce9e230335a8a4d9af402

    SHA512

    f935e3cd27a5fb3f7900b499ea86d093c37e39ac57a8ea8a13e6cacb4a10fbf001d8bfe1499b0ccbf03fb519eb08296b7dac712dab4431442a9857792b519861

  • C:\Users\Admin\AppData\Local\Temp\20231007T050922_892.exe

    Filesize

    5KB

    MD5

    49ccfaf492138c0e18c51958b0b6fb32

    SHA1

    4613a67cd96038e4a572bc233a5fa854d549f0d0

    SHA256

    bd905c26eb5ccee01f113d22cc0614369b26c377bfdce9e230335a8a4d9af402

    SHA512

    f935e3cd27a5fb3f7900b499ea86d093c37e39ac57a8ea8a13e6cacb4a10fbf001d8bfe1499b0ccbf03fb519eb08296b7dac712dab4431442a9857792b519861

  • C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe

    Filesize

    5KB

    MD5

    297b76a4d354604a235993bb3a84a856

    SHA1

    7dec0656ba5dc917b4c08145b29199a5f424a38b

    SHA256

    a67468a81c53bb2829807bf961f7a5ef68bd002ce5bf46ebba79a5cd36d9aa05

    SHA512

    ece13bd4af281e64e185ef1be567849aedf78e6ef2c9f9d11c8d52eb8df5d528fc238c9073888b7960623344bca46545a032031ef60310f0db359ecc7d031a59

  • C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe

    Filesize

    5KB

    MD5

    297b76a4d354604a235993bb3a84a856

    SHA1

    7dec0656ba5dc917b4c08145b29199a5f424a38b

    SHA256

    a67468a81c53bb2829807bf961f7a5ef68bd002ce5bf46ebba79a5cd36d9aa05

    SHA512

    ece13bd4af281e64e185ef1be567849aedf78e6ef2c9f9d11c8d52eb8df5d528fc238c9073888b7960623344bca46545a032031ef60310f0db359ecc7d031a59

  • C:\Users\Admin\AppData\Local\Temp\20231007T051005_704.exe

    Filesize

    5KB

    MD5

    297b76a4d354604a235993bb3a84a856

    SHA1

    7dec0656ba5dc917b4c08145b29199a5f424a38b

    SHA256

    a67468a81c53bb2829807bf961f7a5ef68bd002ce5bf46ebba79a5cd36d9aa05

    SHA512

    ece13bd4af281e64e185ef1be567849aedf78e6ef2c9f9d11c8d52eb8df5d528fc238c9073888b7960623344bca46545a032031ef60310f0db359ecc7d031a59

  • C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe

    Filesize

    5KB

    MD5

    558c52d68576eb936f700cc67d975398

    SHA1

    cf7c8697d553469e7c4801ca4d50835ceddeadde

    SHA256

    121b3c26149af434a431793a95a5cd0de6f69cf9e7a21858acdbb911c45657eb

    SHA512

    fd29dc33e59c3be41085ed436b8a9200e665bf72f47e49677b7dc0b1354fbdbaa63a8e61b02ea46e89663bad77e573fd2edf8f5cd5967d3611f6574e5d1a260f

  • C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe

    Filesize

    5KB

    MD5

    558c52d68576eb936f700cc67d975398

    SHA1

    cf7c8697d553469e7c4801ca4d50835ceddeadde

    SHA256

    121b3c26149af434a431793a95a5cd0de6f69cf9e7a21858acdbb911c45657eb

    SHA512

    fd29dc33e59c3be41085ed436b8a9200e665bf72f47e49677b7dc0b1354fbdbaa63a8e61b02ea46e89663bad77e573fd2edf8f5cd5967d3611f6574e5d1a260f

  • C:\Users\Admin\AppData\Local\Temp\20231007T051045_111.exe

    Filesize

    5KB

    MD5

    558c52d68576eb936f700cc67d975398

    SHA1

    cf7c8697d553469e7c4801ca4d50835ceddeadde

    SHA256

    121b3c26149af434a431793a95a5cd0de6f69cf9e7a21858acdbb911c45657eb

    SHA512

    fd29dc33e59c3be41085ed436b8a9200e665bf72f47e49677b7dc0b1354fbdbaa63a8e61b02ea46e89663bad77e573fd2edf8f5cd5967d3611f6574e5d1a260f