Analysis

  • max time kernel
    134s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 07:26

General

  • Target

    4acf8dad62d23335ad3598514f058639.exe

  • Size

    80KB

  • MD5

    4acf8dad62d23335ad3598514f058639

  • SHA1

    454d4b4e3a09770bfb8ba5a436d66ba3ff11a81e

  • SHA256

    754f7bd3b25bc9177186cddd538a602622fed637cf437d2f17d0c83f5544543f

  • SHA512

    9f5be1d54598a3850196d263484210fa868d7e81d767816bd307ded6993226b3d7320b62cc6344dc79e2632094ec30f6d021b5883d924c13b801d9b539e94d40

  • SSDEEP

    1536:PKlf7rQLhr6d3S+g02YpzubeuO2ifJivztemEVQfh19eg+QxWBjwce1lQEWUEdw:P47NS+phbupgQvztjfNegTxW2EEqq

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4acf8dad62d23335ad3598514f058639.exe
    "C:\Users\Admin\AppData\Local\Temp\4acf8dad62d23335ad3598514f058639.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\vfvxvdaqk.bat
      2⤵
        PID:4332

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\vfvxvdaqk.bat

            Filesize

            229B

            MD5

            3d1f24ab267b45fd662693112fba57be

            SHA1

            3ab5918c462945e85b8ffd40a450268abf8f96ac

            SHA256

            f78e881723601f511f2e53d2696e648ed1e90deca0206f533f20298868050bfa

            SHA512

            abbc8c457ef0c5106f8a349c9af884eb8ac789ccc8c0f4319ee31620ff3148d9ea9ad1b0ca0956c4610bcf3c5a755531b2cfb39c7ec6bb830a03576f00ebf010