Analysis

  • max time kernel
    144s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 05:09

General

  • Target

    56d39de5ab9a710c718893c9892f82a1.exe

  • Size

    2.1MB

  • MD5

    56d39de5ab9a710c718893c9892f82a1

  • SHA1

    d6ddb0a2fda16180b2ccbd2f8533ec39d8df0750

  • SHA256

    cffc9f38b735b1416052dc94bb05f10518e5e7bff3329c6af0fea234f9d71e6b

  • SHA512

    654ae67641ed6f6e0d619e9bf2e40f068bb35bf2540c70f2a18ecc0bfde6e740addd90a5694446f2882e595492e6eb0344f558a51f9532073659cc5fee70dcf8

  • SSDEEP

    49152:g+htcCi4I0V/ROqRFWk2ErQEySqgywGgTeVWw9ZchuYL0r/c:g+hvV/ROqR86yiDGRVYh3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56d39de5ab9a710c718893c9892f82a1.exe
    "C:\Users\Admin\AppData\Local\Temp\56d39de5ab9a710c718893c9892f82a1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2w.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2w.exe
      2⤵
      • Executes dropped EXE
      PID:4700

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2w.exe

          Filesize

          92KB

          MD5

          3e3667107dac3770e84f2f246e0ecb05

          SHA1

          74b0c99f1b561e701ca8d769158fa39655e48c7a

          SHA256

          8838d9efdcb52351e54af7ed403adfab35f24e9da4c4ecbaafd89391b40e5b8c

          SHA512

          2d40075c6666411d4beb3cb2a448be39f2dacd6f6b77551a679023b69c3f49166833784b05ab5ffad17b98bf3ae66700700c955bcae3c37114840013cc0d90ad