Analysis

  • max time kernel
    152s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 17:09

General

  • Target

    8064e5b26acd8518aa2833831642f9ce.exe

  • Size

    1.7MB

  • MD5

    8064e5b26acd8518aa2833831642f9ce

  • SHA1

    3c49909ced493884dd62ccc6681e3ba486c5d57f

  • SHA256

    23aa6ba1723900a4acb270b4264558f13f08cb8b52ee02cc01a76eedadb1d292

  • SHA512

    e2902fbf3ded2bbde235fd565de576c70f392d42121d87dee3ab2f23e77c0fd906428e5c981a9a2546cadb3d817b681059095252a9b379a0f3e76ff2547cc7c7

  • SSDEEP

    24576:5naQBUB7UsYhddFzsq71iSOVRvsc5LzX1AUMcEWUPKkS3rJQBtUkBgJ:5aek0rzeSovv1ApPiinXBgJ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8064e5b26acd8518aa2833831642f9ce.exe
    "C:\Users\Admin\AppData\Local\Temp\8064e5b26acd8518aa2833831642f9ce.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\is-34P80.tmp\8064e5b26acd8518aa2833831642f9ce.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-34P80.tmp\8064e5b26acd8518aa2833831642f9ce.tmp" /SL5="$401CE,1376890,54272,C:\Users\Admin\AppData\Local\Temp\8064e5b26acd8518aa2833831642f9ce.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4656

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-34P80.tmp\8064e5b26acd8518aa2833831642f9ce.tmp

          Filesize

          688KB

          MD5

          c765336f0dcf4efdcc2101eed67cd30c

          SHA1

          fa0279f59738c5aa3b6b20106e109ccd77f895a7

          SHA256

          c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

          SHA512

          06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

        • C:\Users\Admin\AppData\Local\Temp\is-SURV3.tmp\_isetup\_isdecmp.dll

          Filesize

          19KB

          MD5

          3adaa386b671c2df3bae5b39dc093008

          SHA1

          067cf95fbdb922d81db58432c46930f86d23dded

          SHA256

          71cd2f5bc6e13b8349a7c98697c6d2e3fcdeea92699cedd591875bea869fae38

          SHA512

          bbe4187758d1a69f75a8cca6b3184e0c20cf8701b16531b55ed4987497934b3c9ef66ecd5e6b83c7357f69734f1c8301b9f82f0a024bb693b732a2d5760fd303

        • C:\Users\Admin\AppData\Local\Temp\is-SURV3.tmp\itdownload.dll

          Filesize

          200KB

          MD5

          d82a429efd885ca0f324dd92afb6b7b8

          SHA1

          86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

          SHA256

          b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

          SHA512

          5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

        • memory/2528-26-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2528-2-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/2528-0-0x0000000000400000-0x0000000000414000-memory.dmp

          Filesize

          80KB

        • memory/4656-32-0x0000000005EA0000-0x0000000005EA1000-memory.dmp

          Filesize

          4KB

        • memory/4656-36-0x0000000005EE0000-0x0000000005EE1000-memory.dmp

          Filesize

          4KB

        • memory/4656-27-0x00000000025A0000-0x00000000025A1000-memory.dmp

          Filesize

          4KB

        • memory/4656-28-0x0000000005E60000-0x0000000005E61000-memory.dmp

          Filesize

          4KB

        • memory/4656-30-0x0000000005E80000-0x0000000005E81000-memory.dmp

          Filesize

          4KB

        • memory/4656-29-0x0000000005E70000-0x0000000005E71000-memory.dmp

          Filesize

          4KB

        • memory/4656-31-0x0000000005E90000-0x0000000005E91000-memory.dmp

          Filesize

          4KB

        • memory/4656-33-0x0000000005EB0000-0x0000000005EB1000-memory.dmp

          Filesize

          4KB

        • memory/4656-7-0x0000000002240000-0x0000000002241000-memory.dmp

          Filesize

          4KB

        • memory/4656-34-0x0000000005EC0000-0x0000000005EC1000-memory.dmp

          Filesize

          4KB

        • memory/4656-35-0x0000000005ED0000-0x0000000005ED1000-memory.dmp

          Filesize

          4KB

        • memory/4656-23-0x00000000038C0000-0x00000000038FC000-memory.dmp

          Filesize

          240KB

        • memory/4656-37-0x0000000005EF0000-0x0000000005EF1000-memory.dmp

          Filesize

          4KB

        • memory/4656-38-0x0000000005F10000-0x0000000005F11000-memory.dmp

          Filesize

          4KB

        • memory/4656-39-0x0000000005F20000-0x0000000005F21000-memory.dmp

          Filesize

          4KB

        • memory/4656-40-0x0000000005F30000-0x0000000005F31000-memory.dmp

          Filesize

          4KB

        • memory/4656-41-0x0000000005F40000-0x0000000005F41000-memory.dmp

          Filesize

          4KB

        • memory/4656-42-0x0000000005F50000-0x0000000005F51000-memory.dmp

          Filesize

          4KB

        • memory/4656-43-0x0000000005F60000-0x0000000005F61000-memory.dmp

          Filesize

          4KB

        • memory/4656-44-0x0000000005F00000-0x0000000005F01000-memory.dmp

          Filesize

          4KB

        • memory/4656-47-0x0000000000400000-0x00000000004BC000-memory.dmp

          Filesize

          752KB

        • memory/4656-48-0x00000000038C0000-0x00000000038FC000-memory.dmp

          Filesize

          240KB

        • memory/4656-50-0x0000000002240000-0x0000000002241000-memory.dmp

          Filesize

          4KB

        • memory/4656-55-0x00000000038C0000-0x00000000038FC000-memory.dmp

          Filesize

          240KB