Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2023 10:35

General

  • Target

    08c942390163c92667923569ac8e0854.exe

  • Size

    1.9MB

  • MD5

    08c942390163c92667923569ac8e0854

  • SHA1

    35987c136c905e2fbb1f803ab8738fa615526c38

  • SHA256

    39c564808b48de8328b67aa0b2bf6cda694819a436f55c433698c1915be7d623

  • SHA512

    2cb0439c60b19ef573dc9b86e3b282f0e5acaa5f01e82f7fc3563228dabf76e622c10ce7090be2be2f2d998f77b73956fa880914ac04dfd5d9326be1c057d9a2

  • SSDEEP

    24576:N2oo60HPdt+1CRiY2eOBvcj3u10dpIY0j+81wcCl9tD8zE41yrgUWX3GcX/y5OdE:Qoa1taC070dyYe1w9VY1cKW68Od8VGc

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe
    "C:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:32
    • C:\Users\Admin\AppData\Local\Temp\4E10.tmp
      "C:\Users\Admin\AppData\Local\Temp\4E10.tmp" --splashC:\Users\Admin\AppData\Local\Temp\08c942390163c92667923569ac8e0854.exe D4E9DB80E3DC3F4927C8220D1C2493004A47F12919037A25C71D035A6DDA701D220154A105256B55500FA7203F4789D998973A6570B1391F43FE261942D1AF86
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4E10.tmp

    Filesize

    1.9MB

    MD5

    bfdb26876a92de5ab8c1962405bdec1f

    SHA1

    1c4c52d8cceb013c34f00808e616e48962ea5f9d

    SHA256

    76e394abc0ae4f20ab178379fcbe41dc08d9e150710b7df0404c59848a5bb2ef

    SHA512

    950897f261575324d68fb35a2d617ad8db2cf2dc69c7ae9af0cee87dfe1a3b9e2bdd2651e2243adccf06b8eb053031f3b7430387b1551379484ac7d23b10b285

  • memory/32-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/4192-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB