Analysis

  • max time kernel
    0s
  • max time network
    11s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 06:10

General

  • Target

    10beb01bc40352fa7ea9778114ba53a1.exe

  • Size

    1.8MB

  • MD5

    10beb01bc40352fa7ea9778114ba53a1

  • SHA1

    4954934b71f0493a0782f5574b318f61162d93f2

  • SHA256

    eca957efa729142749f31670710156edadd9e82234697d1565f57b4c9c301824

  • SHA512

    c44685573b04e8a81aa04a87f97fb5c39a359579008f461988f6830dec63650abc418a56de24311328a91b70b40e175786ad484bcfa5e1391db885e06f0bb549

  • SSDEEP

    49152:Ht1ipbTChxKCnFnQXBbrtgb/iQvu0UHOaVr:Hrip6hxvWbrtUTrUHO0r

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10beb01bc40352fa7ea9778114ba53a1.exe
    "C:\Users\Admin\AppData\Local\Temp\10beb01bc40352fa7ea9778114ba53a1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
        PID:1512
        • C:\Users\Admin\AppData\Local\Temp\10beb01bc40352fa7ea9778114ba53a1.exe
          "C:\Users\Admin\AppData\Local\Temp\10beb01bc40352fa7ea9778114ba53a1.exe"
          3⤵
            PID:3644
          • C:\Users\Admin\AppData\Local\Temp\@AE49CA.tmp.exe
            "C:\Users\Admin\AppData\Local\Temp\@AE49CA.tmp.exe"
            3⤵
              PID:1684
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
                4⤵
                  PID:2236
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
                  4⤵
                    PID:2524
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
              1⤵
                PID:376
                • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 1164
                  2⤵
                    PID:2408
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin3.bat" "
                  1⤵
                    PID:1816
                    • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                      2⤵
                        PID:2228
                        • C:\Windows\SysWOW64\mscaps.exe
                          "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                          3⤵
                            PID:996
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
                        1⤵
                          PID:1164

                        Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\10beb01bc40352fa7ea9778114ba53a1.exe

                          Filesize

                          60KB

                          MD5

                          52f9118e283d5779a9de036431a4e2dd

                          SHA1

                          b2aad83c1420ade798ba5c8b510191b9ef6bc742

                          SHA256

                          a3ef33011e9d25fa9796b281938ed30706cfa0fb21f27c77e0ddffc8961bbcba

                          SHA512

                          7dcbb7620ede9021f4ac1c04b344aae1ce7bd7e1af7f946de87070c4bbcee57078230a6d226545b306af5eb37c0a390e3aa5733458391d11a8759153449e6848

                        • C:\Users\Admin\AppData\Local\Temp\10beb01bc40352fa7ea9778114ba53a1.exe

                          Filesize

                          20KB

                          MD5

                          bb3da6a74023f45d2c00550a8c423a1b

                          SHA1

                          3c7ad4987fa51de20c4640fddf4adcdcc0cd5a3d

                          SHA256

                          4fa62337ad9abb97c3513434ae8055fefa70586b0bc41aee8d84868db9ba8088

                          SHA512

                          23614bae0d82e61e09f241816444ba6b9212794ee5ca202b362aec5b54cce6d554b6838745d343ce8f55350c75131b3c0352199a373440927f25c5bffd522427

                        • C:\Users\Admin\AppData\Local\Temp\@AE49CA.tmp.exe

                          Filesize

                          42KB

                          MD5

                          fc4d82b13cee95b941f1d0f45b1afc48

                          SHA1

                          a59b5ca93dd762194b157722f7422a2a192ce826

                          SHA256

                          f749a04c0dd908340c912f958f3d114b4fc593f70318dff7bce30ef85c68d5cf

                          SHA512

                          9003b37c947a59d39f6de3c33565f1099fae2846171735ac0bc1e1de8250a551a42f981017e05e1cd6163ab68e088731f21c3d72b1689e7b1994437ed50e68f8

                        • C:\Users\Admin\AppData\Local\Temp\@AE49CA.tmp.exe

                          Filesize

                          14KB

                          MD5

                          82b60a5466ab31c5bb523ef673431858

                          SHA1

                          a1378a48f953c79cffcc4a493798803d69883a3b

                          SHA256

                          23d71d06231bbae99dae349f5aadbe35ba611bbe66422aee3bdacc6475cacb28

                          SHA512

                          fb504e33fbd320241f4731bc43724f7410468bfb488167018a748f82dfe3d991c003b81a2999a38b696136866cc42332d034b6d59325957d17536c4205a86373

                        • C:\Users\Admin\AppData\Local\Temp\@AE49CA.tmp.exe

                          Filesize

                          64KB

                          MD5

                          a517f26f1fd70e674d3636602a1d22ef

                          SHA1

                          58e9c744e501b0779cc134fd9369885284c3cec9

                          SHA256

                          436722d6a3a3e8da77dcfae40fcc13c21bf661b70878a79d14dddabd52fe7cb0

                          SHA512

                          bf34094883ea93bd3332ef91aeb1c54f0c7aa1f7d6f81c470bf77ccf7f1bf7ea509b9ea6f34a61558c8998cb6c56c3318b65ab9592c71b1e53e85791f78fbb1b

                        • C:\Users\Admin\AppData\Local\Temp\tmp4F29.tmp

                          Filesize

                          29KB

                          MD5

                          d950b2c6cab38c204f698df42fe37706

                          SHA1

                          a4a6c9daa264943abb0971d18043300b6b994412

                          SHA256

                          1fea6d573b9d878dba165312a8388b32411695971232e97db1f8ea84a8098d1a

                          SHA512

                          e75b60c300b96e8f4eecb3c5d68462d2fff0102485b5f5c5673d4a0140fe54c09c5199c77b2ff1478869e4962b1eddc7b9d554b852ae28d2002eaf55c3c5668f

                        • C:\Users\Admin\AppData\Local\Temp\tmp4F4A.tmp

                          Filesize

                          8KB

                          MD5

                          6a02b95f08ef18b5bbf661447389cf56

                          SHA1

                          cff16f5050be6526187d0f867c235e2bac059d77

                          SHA256

                          0ad34de3b4960c92a60e668613bb63f9c0fb129967e6dda180148e53cb664097

                          SHA512

                          fd04389c19ae4642151c9c4def4752c263f8408d3e4eb43db87cbc5f50ad93a0e785f4c424d0131775e7fe803b4ec928fcf36815d31c799c9ba264aefa641344

                        • C:\Users\Admin\AppData\Local\Temp\tmp4F5A.tmp

                          Filesize

                          11KB

                          MD5

                          2913cf2028885c8cef089a52670f1988

                          SHA1

                          54ec967dfffe94dc176fa731d910b4c6f5a762be

                          SHA256

                          d005b4cb0b7a89f2d16856e5f7a33b515ae30c2e0f6a267cd10a100d21300f08

                          SHA512

                          33b06f92ec1c06491d6d9f170a39ec249d98ce71ae514a3e3fc05474000124574395a17980f97ecc16454d7a7149ea595d27f4e3075ce542b9b67214718cfc6d

                        • C:\Users\Admin\AppData\Local\Temp\tmp4F6B.tmp

                          Filesize

                          61KB

                          MD5

                          ea2ef82670fc5fc2ebbe163647c79bbd

                          SHA1

                          3a197d573314e1776be516c74ad2697b07fa4534

                          SHA256

                          05b7029a1db20e1600c47118f0b92b3232a7ebad777b7c3456c4ef6005779344

                          SHA512

                          6d0edb0c8ad69f6c9ed03e0e8a6542fbbd875042d73cf074d0f72dd71359d4ed9697e0070c897d9e0791fdf3a33bf44520b3b45e23ea2658a23ea94eaa6ef076

                        • C:\Users\Admin\AppData\Local\Temp\tmp4F8C.tmp

                          Filesize

                          31KB

                          MD5

                          cd4228cff57aa1306931fe5637558d1d

                          SHA1

                          95451e11b05215c4a38f6c20b77d4ac46d671c71

                          SHA256

                          1cacd71e3527e28ce8fc45d1898f4c3ad27aab01752d0388d9190dd44d6565c9

                          SHA512

                          6b89eddf2adeca438edbe07ad578b766e1c056a9d556ee20cdb724d373224fc73184de5eea04d0563b2d1040cf7e5937b5a48d6f81574278b13c92834b34698e

                        • C:\Users\Admin\AppData\Local\Temp\tmp4FEB.tmp

                          Filesize

                          32KB

                          MD5

                          8ee4c28e9801347d018af988b3f0c959

                          SHA1

                          07bf2f34fcf9379da695c7ff3ca2e1fc15b647bf

                          SHA256

                          e450b970d5b684936ef8fca95167709c7720519aec6a37858beab14d8d9e99b6

                          SHA512

                          dbd10435e83c13cb620a62879d1f65766157a8e31f3bd4c05b9fd8eb0f4f123dafa10dbad87e16847d560b815ecbfc6df42805a1488b34502963a79ded3a3fca

                        • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

                          Filesize

                          38KB

                          MD5

                          65a85a7a319e5f33b71876ea322f04ca

                          SHA1

                          d45ee2a4360e5f8df98c4abf4215bc0dee1b64f8

                          SHA256

                          5c0324533cab621d376c02410f0e63e62761e932cf58608425ca185ee5f91913

                          SHA512

                          9e6a1fa7775d9a709f21dad8edc77226da5470c5fafa9f6eb1d367aca8561fead3fbae077ec4b661b7db9f11df9c7bd0164796c61a4d4d199d7ec12675909e18

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

                          Filesize

                          25KB

                          MD5

                          82397dcf41a169c8d1eef180d6d1b5bb

                          SHA1

                          034905d3b6e07f5f81f458d05884f95bd47af605

                          SHA256

                          a69f13ca22523cd2c79e51a3222f2b9b29db8b27091f88e340b484cb9e53349b

                          SHA512

                          0b30212eab246f2e27fa4f9ce1693ac39d4d5c810eff52ed4aaf42441e7df436041491a04170d5f380b5e358deba712a6475c1b398c148b73da738e32d1c4797

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

                          Filesize

                          9KB

                          MD5

                          e38643c5d826cd7ec27099f70a42bce0

                          SHA1

                          13a936e8e094e4a0d271beaf9cf9d1862bf9238f

                          SHA256

                          90ab2c0e9fd4f48f78cd7f4ff313eac1f21f67d5f900195c219ece1fbb88190c

                          SHA512

                          bd5338a899a06e5191c04db5620d334ded12cf512269c02e55db9a70324117b1458d584fd7fb1df43ea2efde3f3a76aca15ba962519556027c6a48a20544671c

                        • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

                          Filesize

                          129B

                          MD5

                          d1073c9b34d1bbd570928734aacff6a5

                          SHA1

                          78714e24e88d50e0da8da9d303bec65b2ee6d903

                          SHA256

                          b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

                          SHA512

                          4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

                        • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

                          Filesize

                          196B

                          MD5

                          2a6632c2da8b4220d2ca569fc3994e60

                          SHA1

                          567d4791563ea8ea037f3a5a7e77dd66243ddff7

                          SHA256

                          439a590158e37540533ef1b1c9f0d09186bdc9df577019d810cb70ac37260e7f

                          SHA512

                          5149faffbbb313c296a1ad40d9561346abc1bc552ed2634a6a55615ad8c0818f200f16d6daa18c4ef57c45b0d653d1ac7e043fb45ffdfb402a0a96a999acdd68

                        • C:\Users\Admin\AppData\Roaming\Temp\Admin3.bat

                          Filesize

                          102B

                          MD5

                          2b3f985971a08dbe371fed4d3b3fb20e

                          SHA1

                          8b14a7c25990ddd814860b243fea53d2eaeb2d1f

                          SHA256

                          1951da1827c047a9abffa8f9671b9bbca7e264c31d3681cc2e70716c91065e08

                          SHA512

                          400b2c1f3638844ed823f423db94a2321604af4c40f3a26f932f482026b8ca1a493b781b3eec607a0d23e5acf0f7df993681e8e35ba6771a210fa01889166cf5

                        • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

                          Filesize

                          81KB

                          MD5

                          db7b3012536d14f1b264002a70fc4fa4

                          SHA1

                          0e48c3f7c471d21db205369e1625d15d01d42e3e

                          SHA256

                          23dc02621958b74b9834092c43c046dd76ac9de142f8e4b28101b3e104fb3acf

                          SHA512

                          fd3d7a4d3c53c77a3ba104e4af623ad1ab27673517c93d695a3ff45209b737e93cafefa00aa421b2fe06f8375d1e3e78ad05e44da0223ca07056c7b7554987a9

                        • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

                          Filesize

                          61KB

                          MD5

                          996bd5a839bfb42515fadc28a35a073d

                          SHA1

                          95e5ec610e7e5e37ab9a2193dc1b55e8858c6cef

                          SHA256

                          7abf6ec79888cbd98cdd732be3d646053d9d6ce2c3367de8210aeaba2d4a7f15

                          SHA512

                          4f083b676e09605c7e2c85bc98c0d55672801d1495f18fc6dc99a052dfe25bd12c317d892df27bde4445616497e4ecbf91422c048bb040f8ece360718dcba9e7

                        • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

                          Filesize

                          59KB

                          MD5

                          4558fcf40d90f5644f3ed70f03f79e0e

                          SHA1

                          4cd7530a357f6232a82a7c67e87f9a741227c9b6

                          SHA256

                          07c3d7e4394b715b600a76c87aaa888801cd122a0ca80fa5613164693007c696

                          SHA512

                          6557437b2718b9483e1ae502bb4a38f557e2e6a1dc99e7f41622322be133dd26a6ea38e6b856eae2259ff68b50b4bcf61681bb2c1a1bbb48bfd61f4adfa0a1c8

                        • C:\Windows\SysWOW64\mscaps.exe

                          Filesize

                          4KB

                          MD5

                          898710c3d4df9d5a25c4f092fe7d2dbd

                          SHA1

                          755382483320389ef668629d1f80eced25aa3627

                          SHA256

                          86d5ba9cfe3fa316d0ddbe7fd8a134bc40c232dc2aa1df2f1fb4c831b1db892e

                          SHA512

                          5f90acd53bd0f58a67c7e58b0b6bab53793a6a0ceea4ef6431f89bbe76c57eb5302839e9b40e1c203f84104f4e98ebd61a0fa3264b93c19a6d3c8399276f4338

                        • memory/1684-22-0x0000000010000000-0x0000000010015000-memory.dmp

                          Filesize

                          84KB