Analysis

  • max time kernel
    166s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 06:06

General

  • Target

    55b04f430f07401b737949ab9312fedb.exe

  • Size

    55KB

  • MD5

    55b04f430f07401b737949ab9312fedb

  • SHA1

    94c3ec474d5ff04c6cf9e7eb804c1c6545360e09

  • SHA256

    66dfadb8a20f0045095b1bb3b65c4312f13cca4d8134e6a01119a810ed982039

  • SHA512

    07131c180d31dc7cb4ca434bd511dc5ae7c557e3decfcd35b6d68f7abbea2c9670f9f11413ce441893c9619119e59c35a3f32f4977b558fa7634e82d1a343adb

  • SSDEEP

    1536:YdW5k7dnbv4oNAckHKgj/+aHppf2G/XFUP4kN:oXnbv45R/+yppesXSf

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55b04f430f07401b737949ab9312fedb.exe
    "C:\Users\Admin\AppData\Local\Temp\55b04f430f07401b737949ab9312fedb.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Local\Temp\kbDE79.tmp
      "C:\Users\Admin\AppData\Local\Temp\kbDE79.tmp" 268 "C:\Users\Admin\AppData\Local\Temp\55b04f430f07401b737949ab9312fedb.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4824

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kbDE79.tmp

    Filesize

    55KB

    MD5

    55b04f430f07401b737949ab9312fedb

    SHA1

    94c3ec474d5ff04c6cf9e7eb804c1c6545360e09

    SHA256

    66dfadb8a20f0045095b1bb3b65c4312f13cca4d8134e6a01119a810ed982039

    SHA512

    07131c180d31dc7cb4ca434bd511dc5ae7c557e3decfcd35b6d68f7abbea2c9670f9f11413ce441893c9619119e59c35a3f32f4977b558fa7634e82d1a343adb