Analysis

  • max time kernel
    173s
  • max time network
    179s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2023, 19:16

General

  • Target

    Arturia_Software_Center__2_7_0_2510.exe

  • Size

    27.7MB

  • MD5

    6579e5e086f959556cf4419a6705d339

  • SHA1

    696f5d1f0306927f9e1600d19eec479cbea2b12d

  • SHA256

    e20d1c940ef4316a69af80c501afce3dca476bf3e9c018d5406aef50ab0d8ad7

  • SHA512

    89f67da45c2c6affe9e13679ee8afb34b4b13113afe39eef6027882a095a277564061c98007a598c8931161ec04b19d25cc76b3383a1e2e65caea5a3efd07351

  • SSDEEP

    786432:ZQ0PSAdiG24YtnzL4XfKc1dbLmewni0ZyqyUR:nPSAdiG2HtnzL0dbydniHMR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Arturia_Software_Center__2_7_0_2510.exe
    "C:\Users\Admin\AppData\Local\Temp\Arturia_Software_Center__2_7_0_2510.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4340
    • C:\Users\Admin\AppData\Local\Temp\is-P6644.tmp\Arturia_Software_Center__2_7_0_2510.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-P6644.tmp\Arturia_Software_Center__2_7_0_2510.tmp" /SL5="$100046,28694452,58368,C:\Users\Admin\AppData\Local\Temp\Arturia_Software_Center__2_7_0_2510.exe"
      2⤵
      • Executes dropped EXE
      PID:4844

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-P6644.tmp\Arturia_Software_Center__2_7_0_2510.tmp

          Filesize

          702KB

          MD5

          1afbd25db5c9a90fe05309f7c4fbcf09

          SHA1

          baf330b5c249ca925b4ea19a52fe8b2c27e547fa

          SHA256

          3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

          SHA512

          3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

        • memory/4340-0-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/4340-2-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/4340-7-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/4340-11-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/4844-8-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/4844-9-0x0000000002350000-0x0000000002351000-memory.dmp

          Filesize

          4KB

        • memory/4844-12-0x0000000000400000-0x00000000004BF000-memory.dmp

          Filesize

          764KB

        • memory/4844-13-0x0000000002350000-0x0000000002351000-memory.dmp

          Filesize

          4KB