Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 20:21

General

  • Target

    vrz9hacoe.exe

  • Size

    72KB

  • MD5

    7be69929b9bc407cfb09f140b288c6c5

  • SHA1

    e4620d3828ebd8f588caf0652cdaef0b09b231d8

  • SHA256

    23a8378699f5bb925b32c7124f62468886bf3ce39a9feec1857a446de55f36ce

  • SHA512

    1209ee4b19043b02e94728635b60a84f47542a6c0ae18f8fa0d76a20e3726d2f0ccde50a8dec7fba1398cf836543097621e7700089d9b72edb38ee0253818161

  • SSDEEP

    768:zYnI9ZvPg2k4u+hJDdv260OAhAH4Ii7gLp6uqcl2aauA:zwIrHuCtd3FAhAYIi7Glba

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe
    "C:\Users\Admin\AppData\Local\Temp\vrz9hacoe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Users\Admin\AppData\Roaming\tj27w.exe
      C:\Users\Admin\AppData\Roaming\tj27w.exe
      2⤵
      • Executes dropped EXE
      PID:3896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\tj27w.exe

    Filesize

    72KB

    MD5

    b18e0bd14a7c9d6e52aef4ca551f042c

    SHA1

    54f1cee4680285db8570e96a2f11c88524398fb5

    SHA256

    0ab6f4c8a5ab34495936f44f2b97b473db78532494138680b413c537a94b7d4c

    SHA512

    4a6a27543f30038eccd22a4fe2c62de4fb4a6fbeed356602f880017f1ec3f205b956ee11b9ef1a96559a3b75eb1c6cb06c8b2689efbdb667f2740609680754af