Analysis

  • max time kernel
    145s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 20:39

General

  • Target

    017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3.exe

  • Size

    14.4MB

  • MD5

    f03bc126bbf56d564b666ba149a25fda

  • SHA1

    40b3d8f1c9d0e1de6499732b410f13238f50f6d6

  • SHA256

    017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3

  • SHA512

    8b65ea8a7b73aff5da05dea23e153a2b42bbd8dc9efddd43d719d5426a440def2071dfb8375fb0fa9f251edafb9cd115637b4fc36a2c571079eb22ac4ab41d62

  • SSDEEP

    393216:xOPs7HkcQfXllKfK491AHoRkv00Bc4Pq4uOPiH/Uwub6r3:xOP1coXwLG8LxT/Uwubg3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3.exe
    "C:\Users\Admin\AppData\Local\Temp\017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\is-JPROL.tmp\017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-JPROL.tmp\017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3.tmp" /SL5="$700EC,14168841,847360,C:\Users\Admin\AppData\Local\Temp\017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3.exe"
      2⤵
      • Executes dropped EXE
      PID:4780

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-JPROL.tmp\017f22f37cfda81f20f9013a0a76e322b4cb6301582645065aac774d8028edd3.tmp

          Filesize

          3.0MB

          MD5

          a15756cdd589b66b096f8ee65edf1916

          SHA1

          efc1a632dea55e0a988f7e83c9af0a54b6d1854d

          SHA256

          26a449d290f4fa956e81ea0497a25446c9a288ccef6552ff45e5e10c28e241dc

          SHA512

          a67327b5900f805974c9249514119b258974950698db2df46bd28b11971ea9dccbf01b3bfe54541534c9cf78326f85ec72cb476154d5b1669bb840ee3ab60e2f

        • memory/2436-1-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/2436-8-0x0000000000400000-0x00000000004DC000-memory.dmp

          Filesize

          880KB

        • memory/4780-6-0x0000000000A30000-0x0000000000A31000-memory.dmp

          Filesize

          4KB

        • memory/4780-9-0x0000000000400000-0x0000000000718000-memory.dmp

          Filesize

          3.1MB

        • memory/4780-10-0x0000000000A30000-0x0000000000A31000-memory.dmp

          Filesize

          4KB