Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2024, 13:54

General

  • Target

    4e7afd359d7d87c889268bedbe44864b.exe

  • Size

    873KB

  • MD5

    4e7afd359d7d87c889268bedbe44864b

  • SHA1

    41d0dfaa4e3e5c738a7721f152ad709fa989c112

  • SHA256

    d9642a78d2508221b045e5bbfe8c71c4f70322ad29fb8f52d2fd80b79a3b80b2

  • SHA512

    ac2ab5e6221a128bfc5cd4a72b143f0529afd098d8324726c7580f89e7966fce0e3285f67e6883014d5c31d4c8cb2f4b0f5346bbfa9dd87e376ffaa62e419266

  • SSDEEP

    12288:8aS9YwIuqJURovHusWtaBr1nqR+GDrgloqGyATdaKJLZmN1IKJUZm:8aOIuq6RovEwBhqUJqqGTLZmN1VUZm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e7afd359d7d87c889268bedbe44864b.exe
    "C:\Users\Admin\AppData\Local\Temp\4e7afd359d7d87c889268bedbe44864b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\AppData\Local\Temp\5803.tmp
      "C:\Users\Admin\AppData\Local\Temp\5803.tmp"
      2⤵
      • Executes dropped EXE
      PID:1832

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\5803.tmp

    Filesize

    34KB

    MD5

    30b83cc249d6e0f976e8d01463b22cee

    SHA1

    29d1d79714dbf0c436462a46a74b441c44cbe4ae

    SHA256

    0873eca38e1de49102a423333eb7e94afb09c980503d8f8d67e45da31fa8c632

    SHA512

    222a5f3ea3ea8cd7983f719d32195f2842dca4c0b05e7a9b08caaced70bbc580b5dba1354fa8f77ccb163c5101c1b6c35c9e3fe5f63be7d3b35a4c5653d7320a