Analysis

  • max time kernel
    154s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2024, 08:05

General

  • Target

    405556e1fa7759debf6c245e5366cb3e.exe

  • Size

    24KB

  • MD5

    405556e1fa7759debf6c245e5366cb3e

  • SHA1

    d2067dae7fe271375e229250c98144f573e90059

  • SHA256

    29ddec971a5e017d574ec5e610f44c479c0bb1d76e409118bf465c45fc2d5cc6

  • SHA512

    69f005d6068e61c138c4b6505b3085fa21205e7e3080b0115bcda35e7c828447b28239ef47f71ac31ffb211ae3c3631489342240540e1b015914051b931210fc

  • SSDEEP

    768:+6wqyFnyenoHTMmpAgxfftjaLacmkLGKddm:+bzsooHgAAgxffJaLaSLGydm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\405556e1fa7759debf6c245e5366cb3e.exe
    "C:\Users\Admin\AppData\Local\Temp\405556e1fa7759debf6c245e5366cb3e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4320
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Loads dropped DLL
      PID:3084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp.tmp

          Filesize

          2KB

          MD5

          07e32319dc161756b87093d071b30149

          SHA1

          9772997199370c9dc699eec09a339615dc12b10f

          SHA256

          69f5763b79bf29bee934474420b06f4eca55fb5bc4d8111628accd0bc41b3e00

          SHA512

          05412536a89b40a6131c18d548cd94c64955152688802cde9c642be0f0780334f09e2656fa18832e553c42ed5e2f3738507e011b0b8531699dc54c04afcecc24

        • memory/3084-3-0x0000000010000000-0x0000000010011000-memory.dmp

          Filesize

          68KB

        • memory/3084-4-0x0000000010000000-0x0000000010011000-memory.dmp

          Filesize

          68KB