Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 00:27

General

  • Target

    Api-rp-loading-and-u_422027695.exe

  • Size

    4.9MB

  • MD5

    51ec7805645a14b839db089a7f9857b5

  • SHA1

    57f72ac685abeea6459f2b2a9d386498a360e9df

  • SHA256

    cdf96fa957d1aba7cf7554fe892dc95e4a521c8122da8c3a04c7fbc06619f5b3

  • SHA512

    8e4057c65e3590445eea2ef4727ee2a48e706c07091af11ce975d019c1d7667b661922934a8c9c838c2b2a62a576e39e54d81c10429a099004ab532add594768

  • SSDEEP

    98304:8SiVtV0wR7BhfW6QVeSb6XpyBENUOiS1F9G/CDnWDkP1x:IAKg6QZb6X205f9G/CDcktx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Api-rp-loading-and-u_422027695.exe
    "C:\Users\Admin\AppData\Local\Temp\Api-rp-loading-and-u_422027695.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\is-HHOFC.tmp\Api-rp-loading-and-u_422027695.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-HHOFC.tmp\Api-rp-loading-and-u_422027695.tmp" /SL5="$13005E,4358584,780800,C:\Users\Admin\AppData\Local\Temp\Api-rp-loading-and-u_422027695.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\is-P758H.tmp\Molestiae.exe
        "C:\Users\Admin\AppData\Local\Temp\is-P758H.tmp\Molestiae.exe" 452a5bfea7287fa8a9987da1f788b863
        3⤵
        • Executes dropped EXE
        PID:452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-HHOFC.tmp\Api-rp-loading-and-u_422027695.tmp

    Filesize

    2.9MB

    MD5

    2df376d886e221d7374eb20ba6c497b2

    SHA1

    f4500edeb892b1a8afe15e1852d65272b96ac1b8

    SHA256

    c1f30e77c2fb2a1d7d857aa58e37d2c87916c8b4b2b5cb278c3bf7af6cd7ce35

    SHA512

    5a59bf1649a404f473a92163d08c8af6820930319ea5a2385be150f614b8c3618053d961d907410ebb2e950f22b46fa3dfad3790a5fadd50dfa0327ba155d5be

  • C:\Users\Admin\AppData\Local\Temp\is-P758H.tmp\Molestiae.exe

    Filesize

    7.8MB

    MD5

    30c2257f609804d889e628d03a20c003

    SHA1

    e5b9196d2977a2731646f7515ef8c3c29c0123f7

    SHA256

    8cd57caf49c1cecbb194893cc4c3fe4ad03159178d2914c98d18288219786b79

    SHA512

    d67debb630393b86411f11d3224249872fc001e07f6e4caffe4ec2eac3b185b4012c71d33da5495c6c405042e8c1d492b17196aa50018597a3957ad6bd3154ba

  • memory/452-21-0x0000000004730000-0x0000000004731000-memory.dmp

    Filesize

    4KB

  • memory/452-19-0x0000000000400000-0x00000000019DA000-memory.dmp

    Filesize

    21.9MB

  • memory/452-27-0x0000000000400000-0x00000000019DA000-memory.dmp

    Filesize

    21.9MB

  • memory/452-13-0x0000000000400000-0x00000000019DA000-memory.dmp

    Filesize

    21.9MB

  • memory/452-25-0x0000000000400000-0x00000000019DA000-memory.dmp

    Filesize

    21.9MB

  • memory/452-23-0x0000000000400000-0x00000000019DA000-memory.dmp

    Filesize

    21.9MB

  • memory/452-20-0x0000000000400000-0x00000000019DA000-memory.dmp

    Filesize

    21.9MB

  • memory/452-17-0x0000000000400000-0x00000000019DA000-memory.dmp

    Filesize

    21.9MB

  • memory/4508-14-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4508-0-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4508-2-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/4688-16-0x00000000027E0000-0x00000000027E1000-memory.dmp

    Filesize

    4KB

  • memory/4688-15-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/4688-7-0x00000000027E0000-0x00000000027E1000-memory.dmp

    Filesize

    4KB