Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2024 09:50

General

  • Target

    4dfe69d22cc63550208204bd24091128.exe

  • Size

    125KB

  • MD5

    4dfe69d22cc63550208204bd24091128

  • SHA1

    6fffd15ae55da347cc10b91765fa4225e5cdef0d

  • SHA256

    3e503211ea1165bb0b3cde02cf3d543c4946fa9a522e32941ad3f180f7cbe77f

  • SHA512

    5d3234d39d517ccb8a76fb09cf68c84f2ef84d74ea3859db9dfa3e0a39f217e22da24aa0611360dde5467c8fe11a1f63a0f5ee5efbaec24476267eddb88bdcaa

  • SSDEEP

    3072:kK3VYFCwBU51zjE0UqV8x78FqFGOP34f2PRV9Y6S9:10c180UqUlI409

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dfe69d22cc63550208204bd24091128.exe
    "C:\Users\Admin\AppData\Local\Temp\4dfe69d22cc63550208204bd24091128.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\4dfe69d22cc63550208204bd24091128~.exe
      4dfe69d22cc63550208204bd24091128~.exe
      2⤵
      • Executes dropped EXE
      PID:2192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4dfe69d22cc63550208204bd24091128~.exe

    Filesize

    20KB

    MD5

    598f42d5f0f07df198c0a308318b8540

    SHA1

    02cd3c0a2e21456713a4aa93bcdad729be10ca72

    SHA256

    2ef39eeeb35476f6de59cc3756e5abf3ced4cfbd8d322b27a012947828e7ae7f

    SHA512

    ae5ba62c0edc19d70e916354a21ab6379a476509f5eb0ca13b76985f814219d266103e377fee55ac71545a6d11b4dddd59304794530f10c5622a9d2f0e3c23af

  • memory/1900-4-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB