Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2024 01:45

General

  • Target

    7e8d59557d93084c01bb8ec8fb736935.exe

  • Size

    17.9MB

  • MD5

    7e8d59557d93084c01bb8ec8fb736935

  • SHA1

    312970277268d0b97193ab49c61ee87fb5db95b6

  • SHA256

    a27d93b987704472c46f241847f8b8bf8941466c75aec7949ada76693c1c97c6

  • SHA512

    8ad165289448af65238f37c7adcfbb620e0e3385a4cff7fb52b4d85a859d3bed2ade5cfd3c62151a74e104fb0d57d257af7c0997d6e3d194cc019e4ac4d68048

  • SSDEEP

    393216:8akOcaLL/V1go5kVl5AP21nwcoYTQFFAoKTH1lvhYIp3zeKNopzljVlo37xvfK:LLL/V/A5R3oYTjoKbhYEnNop6LNK

Score
4/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e8d59557d93084c01bb8ec8fb736935.exe
    "C:\Users\Admin\AppData\Local\Temp\7e8d59557d93084c01bb8ec8fb736935.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\AppData\Local\Temp\is-TBN58.tmp\7e8d59557d93084c01bb8ec8fb736935.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-TBN58.tmp\7e8d59557d93084c01bb8ec8fb736935.tmp" /SL5="$4021A,18308710,133120,C:\Users\Admin\AppData\Local\Temp\7e8d59557d93084c01bb8ec8fb736935.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-5AHRF.tmp\_isetup\_isdecmp.dll

    Filesize

    29KB

    MD5

    fd4743e2a51dd8e0d44f96eae1853226

    SHA1

    646cef384e949aaf61e6d0b243d8d84ab04e79b7

    SHA256

    6535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b

    SHA512

    4587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d

  • C:\Users\Admin\AppData\Local\Temp\is-TBN58.tmp\7e8d59557d93084c01bb8ec8fb736935.tmp

    Filesize

    1.1MB

    MD5

    f334d65927f7ec93a41c4eabef84c322

    SHA1

    43c18ef3bc46e778132cb3d09f63cc98338db08b

    SHA256

    21dbcea63205edb3ae9ff4b99ee6f9266994d2305d0b9234b59f243340e01558

    SHA512

    56111f5630ac1cf713fa0c91343a1c3c009e1261cf180d3f1e0d4885c51163f4302b9486464e478c3ede0559bfb520601479555ce59a91d9213b8dcef0e94a5f

  • memory/1440-5-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/1440-13-0x0000000000400000-0x0000000000530000-memory.dmp

    Filesize

    1.2MB

  • memory/1440-16-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/4832-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4832-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB