Analysis
-
max time kernel
3s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
10e46080e57720229f7c977cdad29fc8.exe
Resource
win7-20231215-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
10e46080e57720229f7c977cdad29fc8.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
10e46080e57720229f7c977cdad29fc8.exe
-
Size
1.1MB
-
MD5
10e46080e57720229f7c977cdad29fc8
-
SHA1
893b45d66a6c3a6ea0dd9fb4144b8f355b34511b
-
SHA256
056a541ab4c5a99882b5ae48c8a2627a4ffd7cc5f467e5ef7e965faff3a40bd3
-
SHA512
77d002b33253dd0e98feaccf73b7ad175f9afdf5107195be00f69959e57fa96f026a93d3c9986b2f02f6255713750817330f078ae8e226d96df424a46f45a9f1
-
SSDEEP
24576:0WvknOMEduif0lGo6r1AHI3AFdpk1wiRl9WLKduk9yv:0UeOMcuPG/uHI3zXRz0KEkIv
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3388 Setup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2392 wrote to memory of 3388 2392 10e46080e57720229f7c977cdad29fc8.exe 20 PID 2392 wrote to memory of 3388 2392 10e46080e57720229f7c977cdad29fc8.exe 20 PID 2392 wrote to memory of 3388 2392 10e46080e57720229f7c977cdad29fc8.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\10e46080e57720229f7c977cdad29fc8.exe"C:\Users\Admin\AppData\Local\Temp\10e46080e57720229f7c977cdad29fc8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\a27WSI0jG5\oYfQ19QQ\Setup.exeC:\Users\Admin\AppData\Local\Temp\a27WSI0jG5\oYfQ19QQ\Setup.exe --relaunch2⤵
- Executes dropped EXE
PID:3388
-