Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 20:50

General

  • Target

    7b3fad053f48326b3d69ce2ef83baf38.exe

  • Size

    7.0MB

  • MD5

    7b3fad053f48326b3d69ce2ef83baf38

  • SHA1

    304a1b55953b91822ee9b3eb4f8c6162eb39cf3e

  • SHA256

    64e5b32569d9f0f8494b23e6ed44b0f5ab5fe96308751cf3c0b0bdbe82d88605

  • SHA512

    0550fd571aed1a96a7925b4d3310bfb35132366cf48d072b6304a5337082c5d9b4c286e61a569c5152e9c1523894aad64a810aed6646cd1c86235bd42ddba9fb

  • SSDEEP

    196608:ad/tGPPLAczgTTgvlHcQZyu2WyYGqGgujZ+FT+8LsOxtl:uULJcT0vlHtZyu2FLv5jtotl

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe
    "C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1492
    • C:\Users\Admin\AppData\Local\Temp\is-DH53H.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-DH53H.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp" /SL5="$6006A,6564690,780288,C:\Users\Admin\AppData\Local\Temp\7b3fad053f48326b3d69ce2ef83baf38.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:3736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-DH53H.tmp\7b3fad053f48326b3d69ce2ef83baf38.tmp

    Filesize

    2.5MB

    MD5

    5294b3139fb60c325957fc1dd663a494

    SHA1

    0af1a8b3652a7c973322c8b23c2598e462e13fa4

    SHA256

    725b45973382a7fc599eaee8c9eb294d032962c7809852bdec13daa5df90b4cd

    SHA512

    2d19d6abc62e59d59ace9ce56b36ffca59136dc202574433c864558ea66660cdd77fd572b11bb44b63a14ddc4863f4a80bb0c3eee7fc14df842d1c2e37e624cc

  • C:\Users\Admin\AppData\Local\Temp\is-V9S1G.tmp\_isetup\_isdecmp.dll

    Filesize

    29KB

    MD5

    fd4743e2a51dd8e0d44f96eae1853226

    SHA1

    646cef384e949aaf61e6d0b243d8d84ab04e79b7

    SHA256

    6535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b

    SHA512

    4587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d

  • memory/1492-0-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1492-2-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1492-13-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/3736-6-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB

  • memory/3736-14-0x0000000000400000-0x0000000000682000-memory.dmp

    Filesize

    2.5MB

  • memory/3736-17-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB