Analysis

  • max time kernel
    84s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2023 11:56

General

  • Target

    d7330b5bf5d11776b9e85f164ed4dbac.exe

  • Size

    1.4MB

  • MD5

    d7330b5bf5d11776b9e85f164ed4dbac

  • SHA1

    015c901c53b25b57dcc87b3717ee551bc8e20d77

  • SHA256

    c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14

  • SHA512

    b4298c4011a35302d7ead43d579244983ec644f41a012edf2264003e4faed2f17794853c4b17788ce4bac57bbd4dfa59736a09134819361742337cce7b783e4f

  • SSDEEP

    24576:vy4U3y8WzlCuqdxiatvvNgx9S7cceR3JYeLZk7dLdAgPe5shtj5uTmBeiz:64aazUuUiat3FwZ9vdkFOg/tluT+ei

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7330b5bf5d11776b9e85f164ed4dbac.exe
    "C:\Users\Admin\AppData\Local\Temp\d7330b5bf5d11776b9e85f164ed4dbac.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3948
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3420
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exe
            5⤵
            • Executes dropped EXE
            PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exe

    Filesize

    1.2MB

    MD5

    09f8b3a4c2a3cb91150e2b5e74212b62

    SHA1

    d0fe0a9a50c82b8436d6e588c78a886583ca5031

    SHA256

    19a86cb2947215e3f2ee9be13f72ed40290ecf08400a5603ac0cbdd17be1217c

    SHA512

    1908883c7cfd20f2819d6079c13209c33bdbde32c3705ddd1cd5bcfcd0160f8a45734ef64c3662a002ac7e12d32cc02ff25bf94518b52530bc29d0708eec7d74

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exe

    Filesize

    1.2MB

    MD5

    09f8b3a4c2a3cb91150e2b5e74212b62

    SHA1

    d0fe0a9a50c82b8436d6e588c78a886583ca5031

    SHA256

    19a86cb2947215e3f2ee9be13f72ed40290ecf08400a5603ac0cbdd17be1217c

    SHA512

    1908883c7cfd20f2819d6079c13209c33bdbde32c3705ddd1cd5bcfcd0160f8a45734ef64c3662a002ac7e12d32cc02ff25bf94518b52530bc29d0708eec7d74

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exe

    Filesize

    1.0MB

    MD5

    ecf343a0532408e403bd17e3ac517e09

    SHA1

    e63969192489900f00e9e2b393b6ea2c8b4b60b7

    SHA256

    5bad96daa191ea08b6f3c8731213ee6ea29405017bda92602a32d1e281dbb78d

    SHA512

    965df7ac340596448e01a6836483e7c7f3e4283f1f57f2b12d11531caf9ad228a08111f231fd55287bfaaf5d508a374e1656511b791b852f7ffa462bbc95d5cf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exe

    Filesize

    1.0MB

    MD5

    ecf343a0532408e403bd17e3ac517e09

    SHA1

    e63969192489900f00e9e2b393b6ea2c8b4b60b7

    SHA256

    5bad96daa191ea08b6f3c8731213ee6ea29405017bda92602a32d1e281dbb78d

    SHA512

    965df7ac340596448e01a6836483e7c7f3e4283f1f57f2b12d11531caf9ad228a08111f231fd55287bfaaf5d508a374e1656511b791b852f7ffa462bbc95d5cf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exe

    Filesize

    423KB

    MD5

    0d65e7f1455323fad50d4bdcdfdab90c

    SHA1

    e653481e5115e290cebdb9cdf970ba5962a038a6

    SHA256

    8bf0a852ec6ec638519ae08a38acf835fd7038f7e1d9752ca83d493955992f2b

    SHA512

    47a4a7bb46fefd8d09e4a37426995099f1e670b3f33e5b5450e120682f7b76582ea25b0c446ed55cf6e3217c435b41fe4e4db39f2c70886c7d6c4eff0b6987ec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exe

    Filesize

    423KB

    MD5

    0d65e7f1455323fad50d4bdcdfdab90c

    SHA1

    e653481e5115e290cebdb9cdf970ba5962a038a6

    SHA256

    8bf0a852ec6ec638519ae08a38acf835fd7038f7e1d9752ca83d493955992f2b

    SHA512

    47a4a7bb46fefd8d09e4a37426995099f1e670b3f33e5b5450e120682f7b76582ea25b0c446ed55cf6e3217c435b41fe4e4db39f2c70886c7d6c4eff0b6987ec

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exe

    Filesize

    414KB

    MD5

    a7da70102c9cbc310e550ab81b8c5932

    SHA1

    119c3c97d02d954f8173ab0a6bf31727a85399e2

    SHA256

    5ba39a95a06375a01212ca8b9e173d5f1b848ae5a41e7538f29f15d35830728d

    SHA512

    2700099be8df141b8030ed266010328ab847396dbc1cc8dd23d07d8ff0bfca9d30ef37eae891c16543227a24b32fb15b495964b3e0a96ff69b49abc1d529a392

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exe

    Filesize

    414KB

    MD5

    a7da70102c9cbc310e550ab81b8c5932

    SHA1

    119c3c97d02d954f8173ab0a6bf31727a85399e2

    SHA256

    5ba39a95a06375a01212ca8b9e173d5f1b848ae5a41e7538f29f15d35830728d

    SHA512

    2700099be8df141b8030ed266010328ab847396dbc1cc8dd23d07d8ff0bfca9d30ef37eae891c16543227a24b32fb15b495964b3e0a96ff69b49abc1d529a392