Analysis

  • max time kernel
    92s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 19:46

General

  • Target

    adobe.exe

  • Size

    33.2MB

  • MD5

    9e6f40bdd6ab0fc17b13d78465f7aebe

  • SHA1

    e7465bca144e540ae527b15d496d37b549fecca1

  • SHA256

    7ccf7ef29c06b13acd1dbcd68702a22f9920fc5742128b3c710ec6b7418a8612

  • SHA512

    8383f6c38afd3deadf9ebcd5d887a70b93c91ebfecc2a60b7a77f5c270f0785cb193c31f47a35390ff36a123cf93f432b5c852d56cc97b94009df5d696b9b1f0

  • SSDEEP

    786432:vouQ4GHf7dQuNVMHwJ3QhaBaaRE33borvSC/fPGS8nAuA4V:vouQ4e79VMSqEHE3+jvQnAJ

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adobe.exe
    "C:\Users\Admin\AppData\Local\Temp\adobe.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\adobe.exe
      "C:\Users\Admin\AppData\Local\Temp\adobe.exe"
      2⤵
        PID:3828

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\_MEI44442\python310.dll

            Filesize

            4.3MB

            MD5

            deaf0c0cc3369363b800d2e8e756a402

            SHA1

            3085778735dd8badad4e39df688139f4eed5f954

            SHA256

            156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d

            SHA512

            5cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989