Analysis

  • max time kernel
    145s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2023 13:17

General

  • Target

    301e9200aa3043cb4167acd4721d790f.exe

  • Size

    1.9MB

  • MD5

    301e9200aa3043cb4167acd4721d790f

  • SHA1

    82cb911f8ba3649d5436ff56165911b81bba28d8

  • SHA256

    ea382e1fad4c868f8783caf957a88938d93d129fa67f5ee80978dffe5857b3f0

  • SHA512

    ada0ece9fa9d8926118652a08b745447f8d9034f6a40d8d8be49fc739f289df83efa93ae7a37f52009de1e33f818a5950a6a34c9ee0b80f3781153b3d09cb67f

  • SSDEEP

    49152:Qoa1taC070dDiJNas1oIvBHr3LiGXJlsYxhvf9LuvaQ:Qoa1taC0Jas1oIv5jmQHjh39LWaQ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\301e9200aa3043cb4167acd4721d790f.exe
    "C:\Users\Admin\AppData\Local\Temp\301e9200aa3043cb4167acd4721d790f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Users\Admin\AppData\Local\Temp\A662.tmp
      "C:\Users\Admin\AppData\Local\Temp\A662.tmp" --splashC:\Users\Admin\AppData\Local\Temp\301e9200aa3043cb4167acd4721d790f.exe 13FD2A5A1FF66454129BC9F72F366F522B60D26E6E659271E14722E764176D3CD48ED1C49F1ACCCEA228044F5ECD3E4D7099F2BD963E43D3CFB87DEAD13D3862
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2332

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\A662.tmp

    Filesize

    1.2MB

    MD5

    c7fbc76e6b94ffebaa5bb35ac55bbcae

    SHA1

    8b9928edb097b4cef901fd490249f570bfb29c42

    SHA256

    ece0bc39be60262b01ee573a176b952d2d9c887d11b1e4c77759bb9945357496

    SHA512

    6e0f1373b04c6c16a645883abac557bd5a2793be772d5a56203340d8db20a7cfaa08fab875dc78520a885ffa0c63b22e43b5b968cff9839d81bcd4dd2f92e003

  • C:\Users\Admin\AppData\Local\Temp\A662.tmp

    Filesize

    1.0MB

    MD5

    d903551afb13770ca87babfd47d8e9f9

    SHA1

    7276c1c70b21352783bfb285fb74722a1d159519

    SHA256

    06f48e7e7bf48b95e3ca8d3cd8b5fdaa64134b376739472b1c85dd2a0005f4fd

    SHA512

    39e9c05c9e861291e706d62da8151581c0fd4aebd8da9306934778beb61c7af54c6f6b375a0ae975552336d6eb1bb4b03d8022e7bf0ee8581f445c432c464e83

  • memory/2332-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/4768-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB