Analysis

  • max time kernel
    93s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-01-2024 19:40

General

  • Target

    7065ed7aa619a21a86bf07c9fe926b1a.exe

  • Size

    1.9MB

  • MD5

    7065ed7aa619a21a86bf07c9fe926b1a

  • SHA1

    f866a1c530ac3663f91736b7672d887dc687490f

  • SHA256

    114e5e6fc4c985c603e1da8e1d41fd5a47ea5adb52590321c47fa11b885a5002

  • SHA512

    6dfe818f5ad987228c5373feb6ddc8a494596cb59d831b57abbdaea4912b0606c5e065e6008e8b5b9b4b1ae790ec70609e55467eaf58da9f196dec2f2bd52cbb

  • SSDEEP

    49152:Qoa1taC070dpIdidzzhX4xSgetDzBdHBTk71uwdUOAdLC:Qoa1taC0vdicS/tDzrHBTkkwdUOAdLC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe
    "C:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Users\Admin\AppData\Local\Temp\E84D.tmp
      "C:\Users\Admin\AppData\Local\Temp\E84D.tmp" --splashC:\Users\Admin\AppData\Local\Temp\7065ed7aa619a21a86bf07c9fe926b1a.exe 4E07217FEA4BBDD83C32FC7DCE81851D34EB3F7055F1BEBDFA2A278FCCF205C14B1F8578537D9A35B5225C02029824E2DEFE872941D60916D49FDE5DA576D461
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\E84D.tmp

    Filesize

    1.9MB

    MD5

    efcaf07ba04f0ca6c8a9f77dd80ded6b

    SHA1

    e134c4d96459072b89b76de0065928f46d9cd308

    SHA256

    df697d50ae9115870cb48ba07186e862a51dc32fa852a39bc47da6cb8c7ff8ce

    SHA512

    e2a16769a470735c579a37b6e222f2a7aca3a2fdde3d7ccef9659256c224c6061bc0cd35329bcef65b86f90edbc53e74b249d91d4059df02a8d132c217808917

  • memory/4448-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/4844-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB