Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-01-2024 11:30

General

  • Target

    SecuriteInfo.com.Program.Unwanted.4865.1778.13069.exe

  • Size

    5.6MB

  • MD5

    9aaaf7f4a87f5536e4a5aca99791640f

  • SHA1

    d9f88e6cdaeb0f6c869458db6e94887c1cb393cc

  • SHA256

    527abc7b2e136b4174cf0ced4bd85d4d4c01d40b8c4cc668660e6f1fecf5758c

  • SHA512

    1b3ba6a40bdda1037b250ab2dc3f8e07cdd2143aeba0e1044c546cfea5450822d3d26eae3ee1dfbc57a827ea9037ca623f0b7b7adf7d6517d6c61faf37a89323

  • SSDEEP

    98304:D1QTdmbDBnRi4wSZBfKH8V+B34Gkgw2kTF3KpRrHaac1MTpBgs9udeWA2FY:phbdn02Km+B34GkykB3O9aZ1KweWA2FY

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Program.Unwanted.4865.1778.13069.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Program.Unwanted.4865.1778.13069.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Users\Admin\AppData\Local\Temp\is-4T59D.tmp\SecuriteInfo.com.Program.Unwanted.4865.1778.13069.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4T59D.tmp\SecuriteInfo.com.Program.Unwanted.4865.1778.13069.tmp" /SL5="$90054,5062245,721408,C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Program.Unwanted.4865.1778.13069.exe"
      2⤵
      • Executes dropped EXE
      PID:1160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-4T59D.tmp\SecuriteInfo.com.Program.Unwanted.4865.1778.13069.tmp

    Filesize

    419KB

    MD5

    e76e23df6bd56c1bb056ad72f8355cb8

    SHA1

    b8b8b3f2d7dd2b39243740d9b0b2037ccd593195

    SHA256

    4a8fbc6ff08afca4af34da624c61f98aa226bc01b0e7a4c50b76a0254dd52234

    SHA512

    e02871c18f018ce4c34d4e7936f7039ad76621fcf30bfbabb19f9b89c0eedf2f5cc6b68d91c63689b486d8b4f4e4a24481533a4a4e8a87394fcd2f541fdcfa8d

  • memory/1124-0-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1124-9-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1160-5-0x0000000000B30000-0x0000000000B31000-memory.dmp

    Filesize

    4KB

  • memory/1160-10-0x0000000000400000-0x0000000000679000-memory.dmp

    Filesize

    2.5MB

  • memory/1160-13-0x0000000000B30000-0x0000000000B31000-memory.dmp

    Filesize

    4KB