Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 00:30

General

  • Target

    mphotelsetup.exe

  • Size

    10.6MB

  • MD5

    e742ffab01d07b009c1b3f7ce1cb7133

  • SHA1

    509a3f415df48c00439d092214b4a26166fbde07

  • SHA256

    b1826ca81e016f949afa2a105ac75e3af5212d9da6e01e986f47014c19af0697

  • SHA512

    5cc15095984b00b06a4007155eb4814bee3e496b20e4c48ea7049bbf890da7b1ce1bd42a84c84d4b6d48025599997108270b0d6bc10f182a486e4f6de13300f6

  • SSDEEP

    196608:/HplajtD8FaGv21yUZ6HOFy3g3h7wDbd8ghMKGv0Zo+Vz4V:xlaxzGO1xISo9h3jzi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\mphotelsetup.exe
    "C:\Users\Admin\AppData\Local\Temp\mphotelsetup.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Local\Temp\mptips.exe
      C:\Users\Admin\AppData\Local\Temp\mptips.exe
      2⤵
      • Executes dropped EXE
      PID:620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/620-12-0x0000000000610000-0x0000000000611000-memory.dmp

    Filesize

    4KB

  • memory/620-13-0x0000000000400000-0x0000000000554000-memory.dmp

    Filesize

    1.3MB